First published: Tue Feb 15 2022(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/RestoreDefaults.jspa endpoint. The affected versions are before version 8.21.0.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Jira Data Center | <8.13.18 | |
Atlassian Jira Data Center | >=8.20.0<8.20.6 | |
Atlassian Jira Server | <8.13.18 | |
Atlassian Jira Server | >=8.20.0<8.20.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43952 is a vulnerability that affects Atlassian Jira Server and Data Center before version 8.21.0.
CVE-2021-43952 allows unauthenticated remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/RestoreDefaults.jspa endpoint.
The severity of CVE-2021-43952 is medium, with a severity value of 4.3.
Atlassian Jira Server before version 8.21.0 is affected by CVE-2021-43952.
Atlassian Jira Data Center before version 8.21.0 is affected by CVE-2021-43952.