Description
The file editing functionality in the Atlassian Companion App before version 1.0.0 allows local attackers to have the app run a different executable in place of the app's cmd.exe via a untrusted search path vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-25284 | The file editing functionality in the Atlassian Companion App before version 1.0.0 allows local attackers to have the app run a different executable in place of the app's cmd.exe via a untrusted search path vulnerability. |
References
| Link | Providers |
|---|---|
| https://jira.atlassian.com/browse/CONFSERVER-59734 |
|
History
No history.
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-09-16T17:19:04.361Z
Reserved: 2019-12-30T00:00:00.000Z
Link: CVE-2020-4019
No data.
Status : Modified
Published: 2020-06-01T07:15:11.000
Modified: 2024-11-21T05:32:10.013
Link: CVE-2020-4019
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD