The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
References
Link | Resource |
---|---|
http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17 | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/53595 | Broken Link Third Party Advisory VDB Entry |
http://secunia.com/advisories/49166 | Vendor Advisory |
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17 | Mitigation Vendor Advisory |
http://osvdb.org/81993 | Broken Link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Information
Published : 2012-05-22 08:55
Updated : 2022-05-13 20:25
NVD link : CVE-2012-2928
Mitre link : CVE-2012-2928
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
atlassian
- jira
- confluence_server
gliffy
- gliffy