Description
The WYSIWYG editor resource in Jira Server and Data Center before version 8.8.2 allows remote attackers to inject arbitrary HTML or JavaScript names via an Cross Site Scripting (XSS) vulnerability by pasting javascript code into the editor field.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-6321 | The WYSIWYG editor resource in Jira Server and Data Center before version 8.8.2 allows remote attackers to inject arbitrary HTML or JavaScript names via an Cross Site Scripting (XSS) vulnerability by pasting javascript code into the editor field. |
References
| Link | Providers |
|---|---|
| https://jira.atlassian.com/browse/JRASERVER-71184 |
|
History
No history.
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-09-16T16:59:07.646Z
Reserved: 2020-06-16T00:00:00.000Z
Link: CVE-2020-14164
No data.
Status : Modified
Published: 2020-07-01T02:15:11.677
Modified: 2024-11-21T05:02:46.907
Link: CVE-2020-14164
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD