Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-28337 | Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1. |
| Link | Providers |
|---|---|
| https://jira.atlassian.com/browse/JRASERVER-72940 |
|
Wed, 09 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-10-09T19:23:22.782Z
Reserved: 2021-09-16T00:00:00.000Z
Link: CVE-2021-41308
Updated: 2024-08-04T03:08:31.936Z
Status : Modified
Published: 2021-10-26T05:15:07.477
Modified: 2024-11-21T06:26:01.140
Link: CVE-2021-41308
No data.
OpenCVE Enrichment
No data.
EUVD