First published: Tue Feb 15 2022(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to modify several resources (including CsvFieldMappingsPage.jspa and ImporterValueMappingsPage.jspa) via a Cross-Site Request Forgery (CSRF) vulnerability in the jira-importers-plugin. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Data Center | <8.13.5 | |
Atlassian Jira Data Center | >=8.14.0<8.20.3 | |
Atlassian Jira Server | <8.13.5 | |
Atlassian Jira Server | >=8.14.0<8.20.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-43941.
The severity of CVE-2021-43941 is medium with a score of 6.5.
Atlassian Jira Server versions up to 8.13.5 and versions between 8.14.0 and 8.20.3, as well as Atlassian Jira Data Center versions up to 8.13.5 and versions between 8.14.0 and 8.20.3 are affected.
The vulnerability CVE-2021-43941 allows remote attackers to modify several resources in Atlassian Jira Server and Data Center, including CsvFieldMappingsPage.jspa and ImporterValueMappingsPage.jspa, via a Cross-Site Request Forgery (CSRF) vulnerability in the jira-importers-plugin.
Yes, Atlassian has released security patches to address the vulnerability. It is recommended to update to the latest version of Jira Server or Data Center to mitigate the risk.