Vulnerability CVE-2018-20239


Published: 2019-04-30

Description:
Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.5/10
2.9/10
6.8/10
Exploit range
Attack complexity
Authentication
Remote
Medium
Single time
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Atlassian -> Application links 
Atlassian -> JIRA 

 References:
https://ecosystem.atlassian.net/browse/APL-1373
https://jira.atlassian.com/browse/CONFSERVER-58208
https://jira.atlassian.com/browse/CRUC-8379
https://jira.atlassian.com/browse/CWD-5362
https://jira.atlassian.com/browse/FE-7161
https://jira.atlassian.com/browse/JRASERVER-68855

Copyright 2024, cxsecurity.com

 

Back to Top