First published: Tue Jan 04 2022(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Reflected Cross-Site Scripting (XSS) vulnerability in the /rest/collectors/1.0/template/custom endpoint. To exploit this issue, the attacker must trick a user into visiting a malicious website. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Server | >=8.14.0<8.20.3 | |
Atlassian Jira Server and Data Center | <8.13.5 | |
>=8.14.0<8.20.3 | ||
<8.13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43942 is a vulnerability in Atlassian Jira Server and Data Center that allows remote attackers to inject arbitrary HTML or JavaScript via a Reflected Cross-Site Scripting (XSS) vulnerability.
CVE-2021-43942 affects Atlassian Jira Server versions between 8.14.0 and 8.20.3.
CVE-2021-43942 affects Atlassian Jira Server and Data Center versions up to 8.13.5.
CVE-2021-43942 has a severity rating of medium with a CVSS score of 6.1.
To fix CVE-2021-43942, upgrade Atlassian Jira Server to version 8.20.3 or later, and Atlassian Jira Server and Data Center to version 8.13.5 or later.