First published: Mon Nov 01 2021(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.20.7.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Data Center | <8.20.7 | |
Atlassian Jira Server | <8.20.7 | |
<8.20.7 | ||
<8.20.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-41313.
Versions of Atlassian Jira Server and Data Center before 8.20.7 are affected.
The severity of CVE-2021-41313 is medium, with a CVSS score of 4.3.
Authenticated but non-admin remote attackers can exploit this vulnerability by editing email batch configurations via the /secure/admin/ConfigureBatching!default.jspa endpoint.
Yes, updating Atlassian Jira Server and Data Center to version 8.20.7 or later will fix this vulnerability.