A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/JRASERVER-73863 | Vendor Advisory |
https://jira.atlassian.com/browse/JSDSERVER-11840 | Vendor Advisory |
https://confluence.atlassian.com/display/JIRA/Jira+Server+Security+Advisory+29nd+June+2022 | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-29 23:15
Updated : 2022-08-04 08:31
NVD link : CVE-2022-26135
Mitre link : CVE-2022-26135
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
atlassian
- jira_service_management
- jira_data_center
- jira_server
- jira_service_desk