CVE-2021-41308

Severity
6.5MEDIUM
EPSS
0.1%
top 65.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 26
Latest updateMay 24

Description

Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages6 packages

CVEListV5atlassian/jira_data_centerunspecified8.6.0+4
NVDatlassian/jira_data_center8.7.08.13.12
NVDatlassian/jira_software_data_center8.14.08.20.1+1
CVEListV5atlassian/jira_serverunspecified8.6.0+4
NVDatlassian/jira_server8.7.08.13.12+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-rp7g-jcrp-vx5f: Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication set2022-05-24
CVEList
CVE-2021-41308: Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication set2021-10-26
CVE-2021-41308 (MEDIUM CVSS 6.5) | Affected versions of Atlassian Jira | cvebase.io