Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-36799


This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. In this case the security improvement was to protect against using the XStream library to be able to execute arbitrary code in velocity templates. The affected versions are before version 8.13.19, from version 8.14.0 before 8.20.7, and from version 8.21.0 before 8.22.1.


Published

2022-08-01T11:15:14.347

Last Modified

2024-11-21T07:13:46.837

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

Weaknesses
  • Type: Primary
    CWE-94
  • Type: Secondary
    CWE-94

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application atlassian jira_data_center < 8.13.19 Yes
Application atlassian jira_data_center < 8.20.7 Yes
Application atlassian jira_data_center < 8.22.1 Yes
Application atlassian jira_server < 8.13.19 Yes
Application atlassian jira_server < 8.20.7 Yes
Application atlassian jira_server < 8.22.1 Yes

References