Atlassian Jira < 8.13.15 Template Injection

high Web App Scanning Plugin ID 113281

概要

Atlassian Jira < 8.13.15 Template Injection

說明

According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 8.13.15 or 8.14.x prior to 8.20.3. It is, therefore, affected by a vulnerability allowing remote attackers with administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

解決方案

升級至 Atlassian JIRA 8.13.15 或更新版本。

另請參閱

https://jira.atlassian.com/browse/JRASERVER-73072

Plugin 詳細資訊

嚴重性: High

ID: 113281

類型: remote

已發布: 2022/7/8

已更新: 2023/3/14

掃描範本: api, basic, full, pci, scan

風險資訊

VPR

風險因素: Medium

分數: 5.9

CVSS v2

風險因素: High

基本分數: 9

媒介: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2021-43947

CVSS v3

風險因素: High

基本分數: 7.2

媒介: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS 評分資料來源: CVE-2021-43944

弱點資訊

CPE: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2021/11/30

弱點發布日期: 2022/3/8

參考資訊

CVE: CVE-2021-43944, CVE-2021-43947