Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-26135


A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.


Published

2022-06-30T06:15:07.693

Last Modified

2024-11-21T06:53:30.093

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-918
  • Type: Secondary
    CWE-918

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application atlassian jira_data_center < 8.13.22 Yes
Application atlassian jira_data_center < 8.20.10 Yes
Application atlassian jira_data_center < 8.22.4 Yes
Application atlassian jira_server < 8.13.22 Yes
Application atlassian jira_server < 8.20.10 Yes
Application atlassian jira_server < 8.22.4 Yes
Application atlassian jira_service_desk < 4.13.22 Yes
Application atlassian jira_service_desk < 4.13.22 Yes
Application atlassian jira_service_management < 4.20.10 Yes
Application atlassian jira_service_management < 4.20.10 Yes
Application atlassian jira_service_management < 4.22.4 Yes
Application atlassian jira_service_management < 4.22.4 Yes

References