CVE-2012-2926
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
Published
2012-05-22T15:55:02.853
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 9.1 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:N/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
4.9
Weaknesses
-
Type: Primary
NVD-CWE-noinfo
Affected Vendors & Products
References
-
http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17
Patch, Vendor Advisory
([email protected])
-
http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17
Patch, Vendor Advisory
([email protected])
-
http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17
Patch, Vendor Advisory
([email protected])
-
http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17
Patch, Vendor Advisory
([email protected])
-
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17
Patch, Vendor Advisory
([email protected])
-
http://osvdb.org/81993
Broken Link
([email protected])
-
http://secunia.com/advisories/49146
Not Applicable
([email protected])
-
http://www.securityfocus.com/bid/53595
Third Party Advisory, VDB Entry
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75682
Third Party Advisory, VDB Entry
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697
Third Party Advisory, VDB Entry
([email protected])
-
http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/81993
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/49146
Not Applicable
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/53595
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75682
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)