CVE-2019-20098Cross-Site Request Forgery in Atlassian Jira Server

Severity
4.3MEDIUMNVD
EPSS
0.4%
top 37.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 12
Latest updateMay 24

Description

The VerifySmtpServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF). An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

CVEListV5atlassian/jira_serverunspecified8.7.0
NVDatlassian/jira_server7.6.158.5.4+1
NVDatlassian/jira_data_center7.6.158.5.4+1

🔴Vulnerability Details

2
GHSA
GHSA-cr52-r63c-m5wh: The VerifySmtpServerConnection!add2022-05-24
CVEList
CVE-2019-20098: The VerifySmtpServerConnection!add2020-02-12

📋Vendor Advisories

1
Red Hat
Reader: Out-of-bounds memory access due to incorrect integer size promotion leads to arbitrary code execution2019-02-01
CVE-2019-20098 — Cross-Site Request Forgery | cvebase