An issue was discovered in the Gantt-Chart module before 5.5.4 for Jira. Due to a missing privilege check, it is possible to read and write to the module configuration of other users. This can also be used to deliver an XSS payload to other users' dashboards. To exploit this vulnerability, an attacker has to be authenticated.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/Aug/0 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/158751/Gantt-Chart-For-Jira-5.5.3-Missing-Privilege-Check.html | Exploit Third Party Advisory VDB Entry |
https://marketplace.atlassian.com/apps/28997/gantt-chart-for-jira?hosting=cloud&tab=overview | Product Third Party Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-029.txt | Exploit Third Party Advisory |
Configurations
Information
Published : 2020-08-04 13:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-15943
Mitre link : CVE-2020-15943
JSON object : View
CWE
Products Affected
gantt-chart_project
- gantt-chart