Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-20239


Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.


Published

2019-04-30T16:29:00.247

Last Modified

2024-11-21T04:01:08.853

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.4 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

6.8

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application atlassian application_links < 5.0.11 Yes
Application atlassian application_links < 5.2.10 Yes
Application atlassian application_links < 5.3.6 Yes
Application atlassian application_links < 5.4.12 Yes
Application atlassian application_links < 6.0.4 Yes
Application atlassian confluence_data_center < 6.15.2 Yes
Application atlassian confluence_server < 6.15.2 Yes
Application atlassian crowd < 3.4.3 Yes
Application atlassian crucible < 4.7.0 Yes
Application atlassian fisheye < 4.7.0 Yes
Application atlassian jira_data_center < 7.13.3 Yes
Application atlassian jira_data_center < 8.1.0 Yes
Application atlassian jira_server < 7.13.3 Yes
Application atlassian jira_server < 8.1.0 Yes

References