Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1.
2021-10-26T05:15:07.477
2024-11-21T06:26:01.140
Modified
CVSSv3.1: 6.5 (MEDIUM)
AV:N/AC:L/Au:S/C:N/I:P/A:N
8.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | atlassian | jira | < 8.6.0 | Yes |
Application | atlassian | jira_data_center | < 8.13.12 | Yes |
Application | atlassian | jira_server | < 8.13.12 | Yes |
Application | atlassian | jira_server | < 8.20.1 | Yes |
Application | atlassian | jira_software_data_center | < 8.6.0 | Yes |
Application | atlassian | jira_software_data_center | < 8.20.1 | Yes |