Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-9250 | The DefaultOSWorkflowConfigurator class in Jira Server and Jira Data Center before version 8.18.1 allows remote attackers who can trick a system administrator to import their malicious workflow to execute arbitrary code via a Remote Code Execution (RCE) vulnerability. The vulnerability allowed for various problematic OSWorkflow classes to be used as part of workflows. The fix for this issue blocks usage of unsafe conditions, validators, functions and registers that are build-in into OSWorkflow library and other Jira dependencies. Atlassian-made functions or functions provided by 3rd party plugins are not affected by this fix. |
| Link | Providers |
|---|---|
| https://jira.atlassian.com/browse/JRASERVER-72660 |
|
Thu, 17 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Atlassian jira Data Center
Atlassian jira Server |
|
| CPEs | cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Atlassian jira Data Center
Atlassian jira Server |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-10-17T16:03:55.792Z
Reserved: 2018-02-01T00:00:00.000Z
Link: CVE-2017-18113
Updated: 2024-08-05T21:13:48.563Z
Status : Modified
Published: 2021-08-02T03:15:07.110
Modified: 2024-11-21T03:19:23.123
Link: CVE-2017-18113
No data.
OpenCVE Enrichment
No data.
EUVD