First published: Tue Feb 15 2022(Updated: )
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to toggle the Thread Contention and CPU monitoring settings via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/ViewInstrumentation.jspa endpoint. The affected versions are before version 8.13.16, and from version 8.14.0 before 8.20.5.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Data Center | <8.13.16 | |
Atlassian Data Center | >=8.14.0<8.20.5 | |
Atlassian JIRA | <8.13.16 | |
Atlassian JIRA | >=8.14.0<8.20.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43953 is a Cross-Site Request Forgery (CSRF) vulnerability in Atlassian Jira Server and Data Center.
CVE-2021-43953 allows unauthenticated remote attackers to toggle the Thread Contention and CPU monitoring settings.
Affected versions of Atlassian Jira Server and Data Center are before 8.13.16 and between 8.14.0 and 8.20.5.
The severity of CVE-2021-43953 is medium (4.3).
To fix CVE-2021-43953, update Atlassian Jira Server or Data Center to version 8.13.16 or above, or between 8.20.5 and 8.14.0.