First published: Wed Dec 08 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servlet/project-config/PROJECT/roles endpoint. The affected versions are before version 8.19.1.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Software Data Center | <8.19.1 | |
<8.19.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-41311 is high with a severity value of 7.5.
Attackers with access to an administrator account that has had its access revoked can exploit CVE-2021-41311 by modifying projects' Users & Roles settings.
Affected versions of Atlassian Jira Server and Data Center include Atlassian Jira Software Data Center up to version 8.19.1.
CVE-2021-41311 is a Broken Authentication vulnerability.
Yes, you can find more information about CVE-2021-41311 at the following link: [JRASERVER-72802](https://jira.atlassian.com/browse/JRASERVER-72802).