Search criteria

69 vulnerabilities found for Jira by Atlassian

CERTFR-2026-AVI-0065

Vulnerability from certfr_avis - Published: 2026-01-21 - Updated: 2026-01-21

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Software Server versions 11.3.x antérieures à 11.3.0
Atlassian Confluence Confluence Server versions antérieures à 8.5.31
Atlassian Jira Jira Service Management Data Center versions antérieures à 5.12.29
Atlassian Jira Jira Service Management Server versions 11.x antérieures à 11.2.1
Atlassian Jira Jira Service Management Data Center versions 11.x antérieures à 11.2.1
Atlassian Jira Jira Software Data Center versions 11.2.x antérieures à 11.2.1
Atlassian Jira Jira Software Server versions 11.2.x antérieures à 11.2.1
Atlassian Jira Jira Software Data Center versions 10.x antérieures à 10.3.16
Atlassian Jira Jira Service Management Server versions 10.x antérieures à 10.3.16
Atlassian Jira Jira Service Management Server versions 11.3.x antérieures à 11.3.0
Atlassian Confluence Confluence Server versions 9.x antérieures à 9.2.13
Atlassian Confluence Confluence Data Center versions 10.x antérieures à 10.2.2
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.26
Atlassian Jira Jira Service Management Data Center versions 11.3.x antérieures à 11.3.1
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.31
Atlassian Jira Jira Software Server versions antérieures à 9.12.26
Atlassian Confluence Confluence Data Center versions 9.x antérieures à 9.2.13
Atlassian Jira Jira Service Management Data Center versions 10.x antérieures à 10.3.16
Atlassian Jira Jira Software Server versions 10.x antérieures à 10.3.16
Atlassian Jira Jira Service Management Server versions antérieures à 5.12.29
Atlassian Jira Jira Software Data Center versions 11.3.x antérieures à 11.3.0
References
Bulletin de sécurité Atlassian JSWSERVER-26667 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16497 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16496 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101827 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26665 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16485 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26661 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16491 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101878 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16501 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26663 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16503 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26662 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16459 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26654 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26656 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101872 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16502 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101842 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16499 2026-01-20 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16465 2026-01-20 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Software Server versions 11.3.x ant\u00e9rieures \u00e0 11.3.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.31",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.29",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 11.x ant\u00e9rieures \u00e0 11.2.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 11.x ant\u00e9rieures \u00e0 11.2.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 10.x ant\u00e9rieures \u00e0 10.3.16",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 10.x ant\u00e9rieures \u00e0 10.3.16",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 11.3.x ant\u00e9rieures \u00e0 11.3.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 9.x ant\u00e9rieures \u00e0 9.2.13",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 10.x ant\u00e9rieures \u00e0 10.2.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 11.3.x ant\u00e9rieures \u00e0 11.3.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.31",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.x ant\u00e9rieures \u00e0 9.2.13",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 10.x ant\u00e9rieures \u00e0 10.3.16",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 10.x ant\u00e9rieures \u00e0 10.3.16",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.29",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 11.3.x ant\u00e9rieures \u00e0 11.3.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9287"
    },
    {
      "name": "CVE-2025-49146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
    },
    {
      "name": "CVE-2022-25883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
    },
    {
      "name": "CVE-2025-66516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66516"
    },
    {
      "name": "CVE-2025-15284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
    },
    {
      "name": "CVE-2024-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2021-3807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3807"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2022-45693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
    },
    {
      "name": "CVE-2025-54988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
    },
    {
      "name": "CVE-2025-9288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
    },
    {
      "name": "CVE-2025-52434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
    },
    {
      "name": "CVE-2025-53689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53689"
    }
  ],
  "initial_release_date": "2026-01-21T00:00:00",
  "last_revision_date": "2026-01-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2026-AVI-0065",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2026-01-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26667",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26667"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16497",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16497"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16496",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16496"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101827",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101827"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26665",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26665"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16485",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16485"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26661",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26661"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16491",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16491"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101878",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101878"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16501",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16501"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26663",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26663"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16503",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16503"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26662",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26662"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16459",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16459"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26654",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26654"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26656",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26656"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101872",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101872"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16502",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16502"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101842",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101842"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16499",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16499"
    },
    {
      "published_at": "2026-01-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16465",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16465"
    }
  ]
}

CERTFR-2025-AVI-1100

Vulnerability from certfr_avis - Published: 2025-12-12 - Updated: 2025-12-12

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Software Data Center et Server versions 9.12.x antérieures à 9.12.30
Atlassian Jira Jira Software Data Center et Server versions 10.3.x antérieures à 10.3.15
Atlassian Confluence Confluence Data Center et Server versions 9.5.x antérieures à 9.5.2
Atlassian Jira Jira Service Management Data Center et Server versions 11.x antérieures à 11.2.1
Atlassian Confluence Confluence Data Center et Server versions 10.0.x antérieures à 10.0.2
Atlassian Confluence Confluence Data Center et Server versions 8.5.x antérieures à 8.5.30
Atlassian Confluence Confluence Data Center et Server versions 10.1.x antérieures à 10.1.0
Atlassian Confluence Confluence Data Center et Server versions 9.2.x antérieures à 9.2.12
Atlassian Confluence Confluence Data Center et Server versions 9.3.x antérieures à 9.3.1
Atlassian Confluence Confluence Data Center et Server versions 9.4.x antérieures à 9.4.0
Atlassian Jira Jira Service Management Data Center et Server versions 10.3.x antérieures à 10.3.15
Atlassian Jira Jira Software Data Center et Server versions 11.x antérieures à 11.2.1
Atlassian Confluence Confluence Data Center et Server versions 10.2.x antérieures à 10.2.1
References
Bulletin de sécurité Atlassian JSDSERVER-16469 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26599 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101574 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26636 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26600 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16461 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16478 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26614 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16458 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26630 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26627 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26634 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16466 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101788 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101478 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101573 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16477 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26635 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16470 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26629 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16479 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26625 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26626 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101575 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16462 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian CONFSERVER-101489 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26619 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16456 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26615 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26628 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSDSERVER-16480 2025-12-11 vendor-advisory
Bulletin de sécurité Atlassian JSWSERVER-26620 2025-12-11 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Software Data Center et Server versions 9.12.x ant\u00e9rieures \u00e0 9.12.30",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center et Server versions 10.3.x ant\u00e9rieures \u00e0 10.3.15",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 9.5.x ant\u00e9rieures \u00e0 9.5.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center et Server versions 11.x ant\u00e9rieures \u00e0 11.2.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 10.0.x ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.30",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.0",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 9.2.x ant\u00e9rieures \u00e0 9.2.12",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 9.4.x ant\u00e9rieures \u00e0 9.4.0",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center et Server versions 10.3.x ant\u00e9rieures \u00e0 10.3.15",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center et Server versions 11.x ant\u00e9rieures \u00e0 11.2.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 10.2.x ant\u00e9rieures \u00e0 10.2.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-39227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39227"
    },
    {
      "name": "CVE-2022-37603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37603"
    },
    {
      "name": "CVE-2025-66516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66516"
    },
    {
      "name": "CVE-2024-29415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
    },
    {
      "name": "CVE-2025-41248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
    },
    {
      "name": "CVE-2025-27152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
    },
    {
      "name": "CVE-2024-21634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
    },
    {
      "name": "CVE-2022-37601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
    },
    {
      "name": "CVE-2025-48976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
    },
    {
      "name": "CVE-2022-45693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45693"
    },
    {
      "name": "CVE-2016-1181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1181"
    },
    {
      "name": "CVE-2025-54988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
    },
    {
      "name": "CVE-2025-55163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
    },
    {
      "name": "CVE-2023-49735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-49735"
    },
    {
      "name": "CVE-2022-3517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3517"
    },
    {
      "name": "CVE-2024-12905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12905"
    },
    {
      "name": "CVE-2020-8203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
    },
    {
      "name": "CVE-2022-37599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
    },
    {
      "name": "CVE-2025-58754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
    },
    {
      "name": "CVE-2016-1182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1182"
    }
  ],
  "initial_release_date": "2025-12-12T00:00:00",
  "last_revision_date": "2025-12-12T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-1100",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-12-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16469",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16469"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26599",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26599"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101574",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101574"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26636",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26636"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26600",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26600"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16461",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16461"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16478",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16478"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26614",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26614"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16458",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16458"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26630",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26630"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26627",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26627"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26634",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26634"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16466",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16466"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101788",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101788"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101478",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101478"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101573",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101573"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16477",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16477"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26635",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26635"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16470",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16470"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26629",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26629"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16479",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16479"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26625",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26625"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26626",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26626"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101575",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101575"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16462",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16462"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101489",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101489"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26619",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26619"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16456",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16456"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26615",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26615"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26628",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26628"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16480",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16480"
    },
    {
      "published_at": "2025-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26620",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26620"
    }
  ]
}

CERTFR-2025-AVI-1025

Vulnerability from certfr_avis - Published: 2025-11-19 - Updated: 2025-11-19

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une falsification de requêtes côté serveur (SSRF).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Software Data Center versions antérieures à 11.2.0
Atlassian Jira Jira Software Data Center versions antérieures à 10.3.10
Atlassian Jira Jira Service Management Server versions antérieures à 10.7.3
Atlassian Confluence Confluence Server versions antérieures à 9.5.4
Atlassian Confluence Confluence Server versions antérieures à 9.2.6
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.7.3
Atlassian Jira Jira Service Management Data Center versions antérieures à 11.2.0
Atlassian Jira Jira Service Management Data Center versions antérieures à 5.12.26
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.3.10
Atlassian Jira Jira Service Management Server versions antérieures à 11.2.0
Atlassian Jira Jira Software Server versions antérieures à 10.7.3
Atlassian Jira Jira Software Server versions antérieures à 11.2.0
Atlassian Confluence Confluence Data Center versions antérieures à 9.2.6
Atlassian Confluence Confluence Data Center versions antérieures à 10.0.2
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.26
Atlassian Confluence Confluence Data Center versions antérieures à 10.1.1
Atlassian Confluence Confluence Server versions antérieures à 10.1.1
Atlassian Jira Jira Service Management Server versions antérieures à 5.12.26
Atlassian Confluence Confluence Data Center versions antérieures à 9.3.1
Atlassian Jira Jira Software Data Center versions antérieures à 10.7.3
Atlassian Jira Jira Software Server versions antérieures à 10.3.10
Atlassian Jira Jira Software Server versions antérieures à 9.12.26
Atlassian Confluence Confluence Server versions antérieures à 8.5.20
Atlassian Confluence Confluence Server versions antérieures à 9.4.0
Atlassian Confluence Confluence Server versions antérieures à 10.0.2
Atlassian Confluence Confluence Data Center versions antérieures à 9.5.4
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.20
Atlassian Confluence Confluence Data Center versions antérieures à 9.4.0
Atlassian Jira Jira Service Management Server versions antérieures à 10.3.10
Atlassian Confluence Confluence Server versions antérieures à 9.3.1

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 11.2.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.3.10",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.7.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.5.4",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.2.6",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.7.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 11.2.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.10",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 11.2.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.7.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 11.2.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.2.6",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 10.1.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 10.1.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.3.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.7.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.3.10",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.20",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.4.0",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.5.4",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.20",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.4.0",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.10",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.3.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-46175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
    },
    {
      "name": "CVE-2025-41248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
    },
    {
      "name": "CVE-2024-45296",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
    },
    {
      "name": "CVE-2025-48976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
    },
    {
      "name": "CVE-2024-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
    },
    {
      "name": "CVE-2022-38900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
    },
    {
      "name": "CVE-2023-42282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
    },
    {
      "name": "CVE-2025-48387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48387"
    }
  ],
  "initial_release_date": "2025-11-19T00:00:00",
  "last_revision_date": "2025-11-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-1025",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-11-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101488",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101488"
    },
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16435",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16435"
    },
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26537",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26537"
    },
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101480",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101480"
    },
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101486",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101486"
    },
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101487",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101487"
    },
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101485",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101485"
    },
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101479",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101479"
    },
    {
      "published_at": "2025-11-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-101477",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-101477"
    }
  ]
}

CERTFR-2025-AVI-0903

Vulnerability from certfr_avis - Published: 2025-10-22 - Updated: 2025-10-22

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Service Management Server versions antérieures à 5.12.28
Atlassian Jira Jira Software Server versions 11.1.x antérieures à 11.1.0
Atlassian Jira Jira Software Data Center versions 11.0.x antérieures à 11.0.1
Atlassian Jira Jira Service Management Data Center versions antérieures à 5.12.28
Atlassian Jira Jira Service Management Server versions 11.0.x antérieures à 11.0.1
Atlassian Confluence Confluence Data Center versions 10.x antérieures à 10.0.2
Atlassian Jira Jira Service Management Data Center versions 11.1.x antérieures à 11.1.0
Atlassian Jira Jira Software Server versions 11.0.x antérieures à 11.0.1
Atlassian Jira Jira Software Server versions antérieures à 9.12.28
Atlassian Jira Jira Service Management Data Center versions 11.0.x antérieures à 11.0.1
Atlassian Jira Jira Service Management Server versions 10.3.x antérieures à 10.3.12
Atlassian Confluence Confluence Data Center versions 9.x antérieures à 9.2.7
Atlassian Jira Jira Service Management Server versions 11.1.x antérieures à 11.1.0
Atlassian Jira Jira Service Management Data Center versions 10.3.x antérieures à 10.3.12
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.28
Atlassian Jira Jira Software Server versions 10.3.x antérieures à 10.3.12
Atlassian Jira Jira Software Data Center versions 11.1.x antérieures à 11.1.0
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.25
Atlassian Jira Jira Software Data Center versions 10.3.x antérieures à 10.3.12

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.28",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 11.1.x ant\u00e9rieures \u00e0 11.1.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 11.0.x ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.28",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 11.0.x ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 10.x ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 11.1.x ant\u00e9rieures \u00e0 11.1.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 11.0.x ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.28",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 11.0.x ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 10.3.x ant\u00e9rieures \u00e0 10.3.12",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.x ant\u00e9rieures \u00e0 9.2.7",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 11.1.x ant\u00e9rieures \u00e0 11.1.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 10.3.x ant\u00e9rieures \u00e0 10.3.12",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.28",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 10.3.x ant\u00e9rieures \u00e0 10.3.12",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 11.1.x ant\u00e9rieures \u00e0 11.1.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.25",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 10.3.x ant\u00e9rieures \u00e0 10.3.12",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-7962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
    },
    {
      "name": "CVE-2025-58057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
    },
    {
      "name": "CVE-2025-48989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
    },
    {
      "name": "CVE-2025-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
    },
    {
      "name": "CVE-2025-22166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22166"
    },
    {
      "name": "CVE-2025-22167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22167"
    }
  ],
  "initial_release_date": "2025-10-22T00:00:00",
  "last_revision_date": "2025-10-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0903",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26567",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26567"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26566",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26566"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16410",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16410"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-100907",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-100907"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26564",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26564"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16408",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16408"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16412",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16412"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16413",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16413"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16411",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16411"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26552",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26552"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26538",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26538"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26565",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26565"
    },
    {
      "published_at": "2025-10-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16409",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16409"
    }
  ]
}

CERTFR-2025-AVI-0794

Vulnerability from certfr_avis - Published: 2025-09-17 - Updated: 2025-09-17

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.24
Atlassian Jira Jira Service Management Data Center versions 10.7.x antérieures à 10.7.3
Atlassian Jira Jira Software Server versions 10.3.x antérieures à 10.3.9
Atlassian Confluence Confluence Server versions 9.5.x antérieures à 9.5.2
Atlassian Jira Jira Software Data Center versions 11.0.x antérieures à 11.0.1
Atlassian Confluence Confluence Server versions 10.0.x antérieures à 10.0.3
Atlassian Jira Jira Service Management Data Center versions 10.3.x antérieures à 10.3.9
Atlassian Jira Jira Service Management Data Center versions antérieures à 5.12.26
Atlassian Confluence Confluence Server versions 9.2.x antérieures à 9.2.6
Atlassian Jira Jira Service Management Server versions 11.0.x antérieures à 11.0.1
Atlassian Confluence Confluence Server versions antérieures à 8.5.24
Atlassian Jira Jira Service Management Server versions 10.3.x antérieures à 10.3.9
Atlassian Jira Jira Software Server versions 11.0.x antérieures à 11.0.1
Atlassian Jira Jira Service Management Data Center versions 11.0.x antérieures à 11.0.1
Atlassian Jira Jira Software Server versions 10.7.x antérieures à 10.7.3
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.26
Atlassian Jira Jira Software Data Center versions 10.3.x antérieures à 10.3.9
Atlassian Confluence Confluence Data Center versions 9.2.x antérieures à 9.2.6
Atlassian Jira Jira Service Management Server versions antérieures à 5.12.26
Atlassian Jira Jira Service Management Server versions 10.7.x antérieures à 10.7.3
Atlassian Jira Jira Software Data Center versions 10.7.x antérieures à 10.7.3
Atlassian Confluence Confluence Data Center versions 9.5.x antérieures à 9.5.2
Atlassian Jira Jira Software Server versions antérieures à 9.12.26
Atlassian Confluence Confluence Data Center versions 10.0.x antérieures à 10.0.3
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.24",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 10.7.x ant\u00e9rieures \u00e0 10.7.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 10.3.x ant\u00e9rieures \u00e0 10.3.9",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 9.5.x ant\u00e9rieures \u00e0 9.5.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 11.0.x ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 10.0.x ant\u00e9rieures \u00e0 10.0.3",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 10.3.x ant\u00e9rieures \u00e0 10.3.9",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 9.2.x ant\u00e9rieures \u00e0 9.2.6",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 11.0.x ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.24",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 10.3.x ant\u00e9rieures \u00e0 10.3.9",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 11.0.x ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 11.0.x ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 10.7.x ant\u00e9rieures \u00e0 10.7.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 10.3.x ant\u00e9rieures \u00e0 10.3.9",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.2.x ant\u00e9rieures \u00e0 9.2.6",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 10.7.x ant\u00e9rieures \u00e0 10.7.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 10.7.x ant\u00e9rieures \u00e0 10.7.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.5.x ant\u00e9rieures \u00e0 9.5.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.26",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 10.0.x ant\u00e9rieures \u00e0 10.0.3",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-52520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
    },
    {
      "name": "CVE-2025-53506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
    },
    {
      "name": "CVE-2025-48734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
    }
  ],
  "initial_release_date": "2025-09-17T00:00:00",
  "last_revision_date": "2025-09-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0794",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16367",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16367"
    },
    {
      "published_at": "2025-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26500",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26500"
    },
    {
      "published_at": "2025-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-100795",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-100795"
    },
    {
      "published_at": "2025-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16369",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16369"
    },
    {
      "published_at": "2025-09-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26499",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26499"
    }
  ]
}

CERTFR-2025-AVI-0593

Vulnerability from certfr_avis - Published: 2025-07-16 - Updated: 2025-07-16

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Service Management Data Center versions 10.x antérieures à 10.7.2
Atlassian Jira Jira Service Management Server versions 10.x antérieures à 10.3.8 LTS
Atlassian Jira Jira Software Data Center versions 10.x antérieures à 10.7.2
Atlassian Jira Jira Software Server versions 9.x antérieures à 9.12.25 LTS
Atlassian Jira Jira Software Server versions 10.x antérieures à 10.7.2
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.3.8 LTS
Atlassian Jira Jira Service Management Server versions 10.x antérieures à 10.7.2
Atlassian Confluence Confluence Server versions 9.x antérieures à 9.5.2
Atlassian Confluence Confluence Server versions 9.x antérieures à 9.2.6 LTS
Atlassian Jira Jira Software Data Center versions 10.x antérieures à 10.3.8 LTS
Atlassian Confluence Confluence Data Center versions 9.x antérieures à 9.2.6 LTS
Atlassian Jira Jira Service Management Data Center versions 5.x antérieures à 5.12.25 LTS
Atlassian Jira Jira Service Management Server versions 5.x antérieures à 5.12.25 LTS
Atlassian Jira Jira Software Data Center versions 9.x antérieures à 9.12.25 LTS
Atlassian Jira Jira Software Server versions 10.x antérieures à 10.3.8 LTS
Atlassian Confluence Confluence Data Center versions 9.x antérieures à 9.5.2

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Service Management Data Center versions 10.x ant\u00e9rieures \u00e0 10.7.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 10.x ant\u00e9rieures \u00e0 10.3.8 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 10.x  ant\u00e9rieures \u00e0 10.7.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 9.x ant\u00e9rieures \u00e0 9.12.25 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 10.x ant\u00e9rieures \u00e0 10.7.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.8 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 10.x ant\u00e9rieures \u00e0 10.7.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 9.x ant\u00e9rieures \u00e0 9.5.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 9.x ant\u00e9rieures \u00e0 9.2.6 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 10.x  ant\u00e9rieures \u00e0 10.3.8 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.x ant\u00e9rieures \u00e0 9.2.6 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 5.x ant\u00e9rieures \u00e0 5.12.25 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 5.x ant\u00e9rieures \u00e0 5.12.25 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 9.x ant\u00e9rieures \u00e0 9.12.25 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 10.x ant\u00e9rieures \u00e0 10.3.8 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions  9.x ant\u00e9rieures \u00e0 9.5.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-27820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27820"
    },
    {
      "name": "CVE-2025-22228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
    },
    {
      "name": "CVE-2025-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
    },
    {
      "name": "CVE-2025-48988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
    },
    {
      "name": "CVE-2025-46701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
    }
  ],
  "initial_release_date": "2025-07-16T00:00:00",
  "last_revision_date": "2025-07-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0593",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26443",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26443"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16310",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16310"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26442",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26442"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16309",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16309"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26470",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26470"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26468",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26468"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16269",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16269"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26469",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26469"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16308",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16308"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16311",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16311"
    },
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-100164",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-100164"
    }
  ]
}

CERTFR-2025-AVI-0520

Vulnerability from certfr_avis - Published: 2025-06-18 - Updated: 2025-06-18

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Service Management Server versions 10.6.x antérieures à 10.6.1
Atlassian Jira Jira Software Data Center versions 10.6.x antérieures à 10.6.1
Atlassian Confluence Confluence Data Center versions 9.5.x antérieures à 9.5.1
Atlassian Jira Jira Service Management Server versions antérieures à 10.3.6
Atlassian Jira Jira Service Management Data Center versions 10.6.x antérieures à 10.6.1
Atlassian Jira Jira Software Server versions antérieures à 10.6.1
Atlassian Confluence Confluence Data Center versions 9.2.x antérieures à 9.2.5
Atlassian Jira Jira Software Data Center versions antérieures à 10.3.6
Atlassian Confluence Confluence Server versions 9.5.x antérieures à 9.5.1
Atlassian Confluence Confluence Server versions 9.2.x antérieures à 9.2.5
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.3.6
Atlassian Confluence Confluence Data Center versions 9.4.x antérieures à 9.4.1
Atlassian Confluence Confluence Server versions antérieures à 8.5.23
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.23
Atlassian Confluence Confluence Server versions 9.4.x antérieures à 9.4.1
Atlassian Jira Jira Software Server versions antérieures à 10.3.6
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Service Management Server versions 10.6.x ant\u00e9rieures \u00e0 10.6.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 10.6.x ant\u00e9rieures \u00e0 10.6.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.5.x ant\u00e9rieures \u00e0 9.5.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.6",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 10.6.x ant\u00e9rieures \u00e0 10.6.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.6.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.3.6",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 9.5.x ant\u00e9rieures \u00e0 9.5.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 9.2.x ant\u00e9rieures \u00e0 9.2.5",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.6",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.23",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.23",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 9.4.x ant\u00e9rieures \u00e0 9.4.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.3.6",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-22228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
    },
    {
      "name": "CVE-2025-31650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
    },
    {
      "name": "CVE-2024-57699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
    }
  ],
  "initial_release_date": "2025-06-18T00:00:00",
  "last_revision_date": "2025-06-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0520",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99921",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-99921"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99835",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-99835"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16260",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16260"
    },
    {
      "published_at": "2025-06-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26411",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26411"
    }
  ]
}

CERTFR-2025-AVI-0435

Vulnerability from certfr_avis - Published: 2025-05-21 - Updated: 2025-05-21

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Confluence Confluence Data Center versions antérieures à 9.3.2
Atlassian Jira Jira Core Data Center versions antérieures à 9.12.22
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.22
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.6.0
Atlassian Jira Jira Service Management Server versions antérieures à 10.6.0
Atlassian Confluence Confluence Server versions antérieures à 9.2.4
Atlassian Jira Jira Service Management Server versions antérieures à 5.12.22
Atlassian Confluence Confluence Server versions antérieures à 9.3.2
Atlassian Jira Jira Core Server versions antérieures à 10.5.1
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.3.5
Atlassian Jira Jira Core Server versions antérieures à 10.3.5
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.5.1
Atlassian Confluence Confluence Data Center versions antérieures à 9.2.4
Atlassian Confluence Confluence Server versions antérieures à 9.4.1
Atlassian Jira Jira Service Management Server versions antérieures à 9.12.22
Atlassian Jira Jira Service Management Server versions antérieures à 10.3.5
Atlassian Jira Jira Service Management Server versions antérieures à 10.5.1
Atlassian Jira Jira Core Data Center versions antérieures à 10.5.1
Atlassian Jira Jira Service Management Data Center versions antérieures à 5.12.22
Atlassian Confluence Confluence Server versions antérieures à 8.5.22
Atlassian Confluence Confluence Data Center versions antérieures à 9.4.1
Atlassian Jira Jira Core Server versions antérieures à 10.6.0
Atlassian Jira Jira Core Data Center versions antérieures à 10.6.0
Atlassian Jira Jira Core Data Center versions antérieures à 10.3.5
Atlassian Jira Jira Core Server versions antérieures à 9.12.22
Atlassian Jira Jira Service Management Data Center versions antérieures à 9.12.22
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.3.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Data Center versions ant\u00e9rieures \u00e0 9.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.22",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.6.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.6.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.2.4",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.3.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Server versions ant\u00e9rieures \u00e0 10.5.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Server versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.5.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.2.4",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.4.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 9.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.5.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Data Center versions ant\u00e9rieures \u00e0 10.5.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.22",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.4.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Server versions ant\u00e9rieures \u00e0 10.6.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Data Center versions ant\u00e9rieures \u00e0 10.6.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Data Center versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Server versions ant\u00e9rieures \u00e0 9.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 9.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-24970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
    },
    {
      "name": "CVE-2025-22157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22157"
    },
    {
      "name": "CVE-2024-47072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47072"
    },
    {
      "name": "CVE-2025-31650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
    }
  ],
  "initial_release_date": "2025-05-21T00:00:00",
  "last_revision_date": "2025-05-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0435",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99686",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-99686"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16206",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16206"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16207",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16207"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99568",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-99568"
    },
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JRASERVER-78766",
      "url": "https://jira.atlassian.com/browse/JRASERVER-78766"
    }
  ]
}

CERTFR-2025-AVI-0316

Vulnerability from certfr_avis - Published: 2025-04-16 - Updated: 2025-04-16

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.21
Atlassian Confluence Confluence Data Center versions antérieures à 9.3.2
Atlassian Jira Jira Software Server versions antérieures à 10.5.1
Atlassian Confluence Confluence Server versions antérieures à 9.2.3
Atlassian Jira Jira Service Management Server versions antérieures à 5.12.22
Atlassian Confluence Confluence Server versions antérieures à 9.3.2
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.3.5
Atlassian Jira Jira Service Management Data Center versions antérieures à 10.5.1
Atlassian Confluence Confluence Server versions antérieures à 8.5.21
Atlassian Jira Jira Software Server versions antérieures à 10.3.5
Atlassian Jira Jira Service Management Server versions antérieures à 10.3.5
Atlassian Jira Jira Service Management Server versions antérieures à 10.5.1
Atlassian Confluence Confluence Data Center versions antérieures à 9.2.3
Atlassian Jira Jira Software Server versions antérieures à 9.12.22
Atlassian Jira Jira Service Management Data Center versions antérieures à 5.12.22
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.22
Atlassian Jira Jira Software Data Center versions antérieures à 10.5.1
Atlassian Jira Jira Software Data Center versions antérieures à 10.3.5
Atlassian Confluence Confluence Data Center versions antérieures à 9.4.0
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.21",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.3.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.5.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.2.3",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.3.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 10.5.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.21",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 10.5.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.2.3",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.22",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.5.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.4.0",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-24970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
    },
    {
      "name": "CVE-2019-10172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
    },
    {
      "name": "CVE-2024-57699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
    }
  ],
  "initial_release_date": "2025-04-16T00:00:00",
  "last_revision_date": "2025-04-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0316",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-04-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99547",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-99547"
    },
    {
      "published_at": "2025-04-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26359",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26359"
    },
    {
      "published_at": "2025-04-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16144",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16144"
    },
    {
      "published_at": "2025-04-15",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99540",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-99540"
    }
  ]
}

CERTFR-2025-AVI-0218

Vulnerability from certfr_avis - Published: 2025-03-19 - Updated: 2025-03-19

De multiples vulnérabilités ont été découvertes dans Atlassian Jira. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Service Management Data Center versions 5.x postérieures à 5.12 et versions 10.x antérieures à 10.3.4
Atlassian Jira Jira Service Management Server versions 10.4.x antérieures à 10.5.0
Atlassian Jira Jira Software Server versions 9.12.x antérieures à 9.12.19
Atlassian Jira Jira Software Server versions 5.x postérieures à 5.12 et versions 10.x antérieures à 10.3.4
Atlassian Jira Jira Service Management Server versions 5.x postérieures à 5.12 et versions 10.x antérieures à 10.3.4
Atlassian Jira Jira Service Management Server versions postérieures à 5.7.0 et antérieures à antérieures à 5.12.19
Atlassian Jira Jira Service Management Data Center versions postérieures à 5.7.0 et antérieures à 5.12.19
Atlassian Jira Jira Service Management Data Center versions 10.4.x antérieures à 10.5.0
Atlassian Jira Jira Software Data Center versions antérieures à 10.3.4
Atlassian Jira Jira Software Server versions 10.4.x antérieures à 10.5.0
Atlassian Jira Jira Software Data Center versions 10.4.x antérieures à 10.5.0
Atlassian Jira Jira Software Data Center versions 9.12.x antérieures à 9.12.19
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Service Management Data Center versions 5.x post\u00e9rieures \u00e0 5.12 et versions 10.x ant\u00e9rieures \u00e0 10.3.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 10.4.x ant\u00e9rieures \u00e0 10.5.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 9.12.x ant\u00e9rieures \u00e0 9.12.19",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 5.x post\u00e9rieures \u00e0 5.12 et versions 10.x ant\u00e9rieures \u00e0 10.3.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 5.x post\u00e9rieures \u00e0 5.12 et versions 10.x ant\u00e9rieures \u00e0 10.3.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions post\u00e9rieures \u00e0 5.7.0 et ant\u00e9rieures \u00e0 ant\u00e9rieures \u00e0 5.12.19",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions post\u00e9rieures \u00e0 5.7.0 et ant\u00e9rieures \u00e0 5.12.19",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 10.4.x ant\u00e9rieures \u00e0 10.5.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.3.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 10.4.x ant\u00e9rieures \u00e0 10.5.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 10.4.x ant\u00e9rieures \u00e0 10.5.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 9.12.x ant\u00e9rieures \u00e0 9.12.19",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2024-47072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47072"
    }
  ],
  "initial_release_date": "2025-03-19T00:00:00",
  "last_revision_date": "2025-03-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0218",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Atlassian Jira. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Atlassian Jira",
  "vendor_advisories": [
    {
      "published_at": "2025-03-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26303",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26303"
    },
    {
      "published_at": "2025-03-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16086",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16086"
    },
    {
      "published_at": "2025-03-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26333",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26333"
    },
    {
      "published_at": "2025-03-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-16083",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-16083"
    }
  ]
}

CERTFR-2025-AVI-0144

Vulnerability from certfr_avis - Published: 2025-02-19 - Updated: 2025-02-19

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Confluence Confluence Server versions antérieures à 8.5.19
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.19
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.15
Atlassian Jira Jira Software Data Center versions antérieures à 9.4.28
Atlassian Jira Jira Software Server versions antérieures à 9.17.4
Atlassian Confluence Confluence Server versions antérieures à 9.2.1
Atlassian Jira Jira Software Server versions antérieures à 9.12.15
Atlassian Jira Jira Software Server versions antérieures à 10.1.2
Atlassian Confluence Confluence Data Center versions antérieures à 9.2.1
Atlassian Jira Jira Software Server versions antérieures à 9.4.28
Atlassian Jira Jira Software Data Center versions antérieures à 9.17.4
Atlassian Jira Jira Software Data Center versions antérieures à 10.1.2
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.19",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.19",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.15",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.4.28",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.17.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 9.2.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.15",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 10.1.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 9.2.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.4.28",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.17.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 10.1.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-56337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2024-50379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
    }
  ],
  "initial_release_date": "2025-02-19T00:00:00",
  "last_revision_date": "2025-02-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0144",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26299",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26299"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99216",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-99216"
    },
    {
      "published_at": "2025-02-18",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-99215",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-99215"
    }
  ]
}

CERTFR-2024-AVI-1006

Vulnerability from certfr_avis - Published: 2024-11-20 - Updated: 2024-11-20

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Core Data Center versions 9.12.x antérieures à 9.12.15 LTS
Atlassian Jira Jira Service Management Data Center versions 5.17.x antérieures à 5.17.4
Atlassian Jira Jira Core Server versions 10.1.x antérieures à 10.1.1
Atlassian Confluence Confluence Server versions 8.5.x antérieures à 8.5.17 LTS
Atlassian Jira Jira Core Server versions 9.4.x antérieures à 9.4.28 LTS
Atlassian Jira Jira Core Server versions 9.17.x antérieures à 9.17.4
Atlassian Jira Jira Service Management Server versions 5.17.x antérieures à 5.17.4
Atlassian Jira Jira Service Management Data Center versions 10.1.x antérieures à 10.1.1
Atlassian Confluence Confluence Data Center versions 8.x antérieures à 8.9.8
Atlassian Jira Jira Core Data Center versions 9.17.x antérieures à 9.17.4
Atlassian Jira Jira Core Server versions 9.12.x antérieures à 9.12.15 LTS
Atlassian Jira Jira Service Management Server versions 10.1.x antérieures à 10.1.1
Atlassian Confluence Confluence Server versions 8.x antérieures à 8.9.8
Atlassian Jira Jira Service Management Server versions 5.12.x antérieures à 5.12.15 LTS
Atlassian Jira Jira Core Data Center versions 9.4.x antérieures à 9.4.28 LTS
Atlassian Jira Jira Service Management Server versions 5.4.x antérieures à 5.4.28 LTS
Atlassian Jira Jira Core Data Center versions 10.1.x antérieures à 10.1.1
Atlassian Confluence Confluence Data Center versions 8.5.x antérieures à 8.5.17 LTS
Atlassian Confluence Confluence Data Center versions 9.x antérieures à 9.1.1
Atlassian Jira Jira Service Management Data Center versions 5.12.x antérieures à 5.12.15 LTS
Atlassian Confluence Confluence Data Center versions 7.19.x antérieures à 7.19.29 LTS
Atlassian Confluence Confluence Server versions 7.19.x antérieures à 7.19.29 LTS
Atlassian Jira Jira Service Management Data Center versions 5.4.x antérieures à 5.4.28 LTS

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Core Data Center versions 9.12.x ant\u00e9rieures \u00e0 9.12.15 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 5.17.x ant\u00e9rieures \u00e0 5.17.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.17 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Server versions 9.4.x ant\u00e9rieures \u00e0 9.4.28 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Server versions 9.17.x ant\u00e9rieures \u00e0 9.17.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 5.17.x ant\u00e9rieures \u00e0 5.17.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 10.1.x ant\u00e9rieures \u00e0 10.1.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 8.x ant\u00e9rieures \u00e0 8.9.8",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Data Center versions 9.17.x ant\u00e9rieures \u00e0 9.17.4",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Server versions 9.12.x ant\u00e9rieures \u00e0 9.12.15 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 8.x ant\u00e9rieures \u00e0 8.9.8",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 5.12.x ant\u00e9rieures \u00e0 5.12.15 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Data Center versions 9.4.x ant\u00e9rieures \u00e0 9.4.28 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions 5.4.x ant\u00e9rieures \u00e0 5.4.28 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Core Data Center versions 10.1.x ant\u00e9rieures \u00e0 10.1.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 8.5.x ant\u00e9rieures \u00e0 8.5.17 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 9.x ant\u00e9rieures \u00e0 9.1.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 5.12.x ant\u00e9rieures \u00e0 5.12.15 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 7.19.x ant\u00e9rieures \u00e0 7.19.29 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 7.19.x ant\u00e9rieures \u00e0 7.19.29 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions 5.4.x ant\u00e9rieures \u00e0 5.4.28 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-4068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
    },
    {
      "name": "CVE-2023-46234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2023-52428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
    },
    {
      "name": "CVE-2024-24549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
    },
    {
      "name": "CVE-2022-38900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    }
  ],
  "initial_release_date": "2024-11-20T00:00:00",
  "last_revision_date": "2024-11-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1006",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-98022",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-98022"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-98299",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-98299"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-98481",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-98481"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-98442",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-98442"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-15626",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-15626"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-15689",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-15689"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-98484",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-98484"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JRASERVER-78199",
      "url": "https://jira.atlassian.com/browse/JRASERVER-78199"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-98231",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-98231"
    },
    {
      "published_at": "2024-11-19",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-98021",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-98021"
    }
  ]
}

CERTFR-2024-AVI-0703

Vulnerability from certfr_avis - Published: 2024-08-21 - Updated: 2024-08-21

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance, une injection de code indirecte à distance (XSS) et une injection de requêtes illégitimes par rebond (CSRF).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Confluence Confluence Data Center et Server versions 8.9.x antérieures à 8.9.5
Atlassian Confluence Confluence Data Center et Server versions 8.x antérieures à 8.5.14
Atlassian Confluence Confluence Data Center et Server versions antérieures à 7.19.26
Atlassian Jira Jira Software Data Center et Server versions 9.17.x antérieures à 9.17.1
Atlassian Jira Jira Software Data Center et Server versions 9.4.x antérieures à 9.4.25
Atlassian Confluence Confluence Data Center et Server versions 9.x antérieures à 9.0.1
Atlassian Jira Jira Software Data Center et Server versions 9.12.x antérieures à 9.12.12
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Confluence Data Center et Server versions 8.9.x ant\u00e9rieures \u00e0 8.9.5",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 8.x ant\u00e9rieures \u00e0 8.5.14",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions ant\u00e9rieures \u00e0 7.19.26",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center et Server versions 9.17.x ant\u00e9rieures \u00e0 9.17.1",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center et Server versions 9.4.x ant\u00e9rieures \u00e0 9.4.25",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center et Server versions 9.x ant\u00e9rieures \u00e0 9.0.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center et Server versions 9.12.x ant\u00e9rieures \u00e0 9.12.12",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-21690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21690"
    },
    {
      "name": "CVE-2024-34750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
    }
  ],
  "initial_release_date": "2024-08-21T00:00:00",
  "last_revision_date": "2024-08-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0703",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-08-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une injection de code indirecte \u00e0 distance (XSS) et une injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2024-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-97720",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-97720"
    },
    {
      "published_at": "2024-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-26047",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-26047"
    },
    {
      "published_at": "2024-08-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-97657",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-97657"
    }
  ]
}

CERTFR-2024-AVI-0590

Vulnerability from certfr_avis - Published: 2024-07-17 - Updated: 2024-07-17

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.0 LTS
Atlassian Confluence Confluence Data Center versions antérieures à 7.19.25 LTS
Atlassian Jira Jira Software Data Center versions antérieures à 9.4.18 LTS
Atlassian Jira Jira Software Data Center versions antérieures à 9.8.0
Atlassian Jira Jira Software Server versions antérieures à 9.8.0
Atlassian Confluence Confluence Server versions antérieures à 8.5.12 LTS
Atlassian Jira Jira Software Server versions antérieures à 9.4.18 LTS
Atlassian Jira Jira Software Server versions antérieures à 9.12.0 LTS
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.12 LTS
Atlassian Confluence Confluence Data Center versions antérieures à 8.9.4
Atlassian Confluence Confluence Server versions antérieures à 7.19.25 LTS
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.0 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 7.19.25 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.4.18 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.8.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.8.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.12 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.4.18 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.0 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.12 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.9.4",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 7.19.25 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2022-41966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41966"
    },
    {
      "name": "CVE-2021-35516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
    },
    {
      "name": "CVE-2021-35517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
    },
    {
      "name": "CVE-2024-21686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21686"
    },
    {
      "name": "CVE-2021-36090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
    },
    {
      "name": "CVE-2019-12402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-12402"
    },
    {
      "name": "CVE-2021-35515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
    }
  ],
  "initial_release_date": "2024-07-17T00:00:00",
  "last_revision_date": "2024-07-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0590",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-96100",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-96100"
    },
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-96103",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-96103"
    },
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-96099",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-96099"
    },
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-25951",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-25951"
    },
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-96101",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-96101"
    },
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-96102",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-96102"
    },
    {
      "published_at": "2024-07-16",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-96134",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-96134"
    }
  ]
}

CERTFR-2024-AVI-0432

Vulnerability from certfr_avis - Published: 2024-05-22 - Updated: 2024-05-22

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Atlassian Confluence Confluence Data Center versions antérieures à 8.9.1
Atlassian Confluence Confluence Data Center versions antérieures à 7.19.22
Atlassian Jira Jira Software Data Center versions antérieures à 9.8.0
Atlassian Jira Jira Software Data Center versions antérieures à 9.11.3
Atlassian Jira Jira Software Server versions antérieures à 9.12.7
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.0
Atlassian Jira Jira Software Server versions antérieures à 9.15.2
Atlassian Confluence Confluence Data Center versions antérieures à 8.5.9
Atlassian Jira Jira Software Data Center versions antérieures à 9.7.2
Atlassian Jira Jira Software Server versions antérieures à 9.4.20
Atlassian Jira Jira Software Data Center versions antérieures à 9.15.2
Atlassian Jira Jira Software Data Center versions antérieures à 9.4.20
Atlassian Jira Jira Software Data Center versions antérieures à 9.12.7
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.9.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 7.19.22",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.8.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.11.3",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.7",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.15.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.5.9",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.7.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.4.20",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.15.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.4.20",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.12.7",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-1597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
    },
    {
      "name": "CVE-2023-45859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45859"
    },
    {
      "name": "CVE-2022-25647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
    },
    {
      "name": "CVE-2022-41966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41966"
    },
    {
      "name": "CVE-2024-23672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23672"
    },
    {
      "name": "CVE-2024-24549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
    },
    {
      "name": "CVE-2024-22257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22257"
    },
    {
      "name": "CVE-2024-21683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21683"
    }
  ],
  "initial_release_date": "2024-05-22T00:00:00",
  "last_revision_date": "2024-05-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0432",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Atlassian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-25950",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-25950"
    },
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-25949",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-25949"
    },
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-95839",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-95839"
    },
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-25896",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-25896"
    },
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-95834",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-95834"
    },
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-95832",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-95832"
    },
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-25948",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-25948"
    },
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-25905",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-25905"
    }
  ]
}

CERTFR-2024-AVI-0312

Vulnerability from certfr_avis - Published: 2024-04-17 - Updated: 2024-04-18

De multiples vulnérabilités ont été découvertes dans les produits Atlassian. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Atlassian Jira Jira Software Data Center versions 9.12.x LTS antérieures à 9.12.7 LTS
Atlassian Jira Jira Service Management Server versions antérieures à 5.4.19 LTS
Atlassian Confluence Confluence Data Center versions 7.x LTS antérieures 7.19.20 LTS
Atlassian Jira Jira Service Management Data Center versions antérieures à 5.4.19 LTS
Atlassian Confluence Confluence Data Center versions antérieures à 8.7.1
Atlassian Jira Jira Software Data Center versions antérieures à 9.15.0
Atlassian Jira Jira Service Management Data Center versions antérieures à 5.12.6
Atlassian Confluence Confluence Server versions antérieures à 8.5.7 LTS
Atlassian Confluence Confluence Server versions 7.x LTS antérieures 7.19.20 LTS
Atlassian Confluence Confluence Data Center versions 8.x LTS antérieures à 8.5.7 LTS
Atlassian Jira Jira Software Server versions 9.1.x, 9.2.x, 9.3.x et 9.4.x antérieures à 9.4.18 LTS
Atlassian Jira Jira Service Management Server versions antérieures à 5.12.6
Atlassian Jira Jira Software Data Center versions 9.1.x, 9.2.x, 9.3.x et 9.4.x antérieures à 9.4.18 LTS
Atlassian Jira Jira Software Server versions antérieures à 9.12.7 LTS

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Jira Software Data Center versions 9.12.x LTS ant\u00e9rieures \u00e0 9.12.7 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.4.19 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 7.x LTS ant\u00e9rieures 7.19.20 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.4.19 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions ant\u00e9rieures \u00e0 8.7.1",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions ant\u00e9rieures \u00e0 9.15.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center versions ant\u00e9rieures \u00e0 5.12.6",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions ant\u00e9rieures \u00e0 8.5.7 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 7.x LTS ant\u00e9rieures 7.19.20 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 8.x LTS ant\u00e9rieures \u00e0 8.5.7 LTS",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions 9.1.x, 9.2.x, 9.3.x et 9.4.x ant\u00e9rieures \u00e0 9.4.18 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Server versions ant\u00e9rieures \u00e0 5.12.6",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Data Center versions 9.1.x, 9.2.x, 9.3.x et 9.4.x ant\u00e9rieures \u00e0 9.4.18 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Software Server versions ant\u00e9rieures \u00e0 9.12.7 LTS",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-1370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
    },
    {
      "name": "CVE-2024-21634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
    },
    {
      "name": "CVE-2023-52428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
    }
  ],
  "initial_release_date": "2024-04-17T00:00:00",
  "last_revision_date": "2024-04-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0312",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-04-17T00:00:00.000000"
    },
    {
      "description": "Mise \u00e0 jour du r\u00e9sum\u00e9",
      "revision_date": "2024-04-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Atlassian\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Atlassian",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSDSERVER-15248 du 16 avril 2024",
      "url": "https://jira.atlassian.com/browse/JSDSERVER-15248"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-25885 du 16 avril 2024",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-25885"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian JSWSERVER-25892 du 16 avril 2024",
      "url": "https://jira.atlassian.com/browse/JSWSERVER-25892"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian CONFSERVER-95099 du 16 avril 2024",
      "url": "https://jira.atlassian.com/browse/CONFSERVER-95099"
    }
  ]
}

CERTFR-2024-AVI-0040

Vulnerability from certfr_avis - Published: 2024-01-16 - Updated: 2024-01-16

De multiples vulnérabilités ont été découvertes dans Atlassian Confluence et Jira. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Atlassian Confluence Confluence Data Center versions LTS 8.5.x antérieures à la version 8.5.5
Atlassian Confluence Confluence Data Center versions 8.x antérieures à la version 8.7.2
Atlassian Jira Jira Service Management Data Center et Jira Service Management Server versions 4.20.x antérieures à la version 4.20.30
Atlassian Jira Jira Data Center et Jira Server versions 9.x antérieures à la version 9.7.0
Atlassian Confluence Confluence Data Center versions 7.x antérieures à la version 7.19.18
Atlassian Confluence Confluence Server versions 7.x antérieures à la version 7.19.18
Atlassian Confluence Confluence Server versions 8.5.x antérieures à la version 8.5.5
Atlassian Jira Jira Service Management Data Center et Jira Service Management Server versions 5.x antérieures à la version 5.12.2
Atlassian Jira Jira Service Management Data Center et Jira Service Management Server versions LTS 5.4.x antérieures à la version 5.4.15
Atlassian Jira Jira Data Center et Jira Server versions LTS 9.4.x antérieures à la version 9.4.13
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Confluence Data Center versions LTS 8.5.x ant\u00e9rieures \u00e0 la version 8.5.5",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 8.x ant\u00e9rieures \u00e0 la version 8.7.2",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center et Jira Service Management Server versions 4.20.x ant\u00e9rieures \u00e0 la version 4.20.30",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Data Center et Jira Server versions 9.x ant\u00e9rieures \u00e0 la version 9.7.0",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Data Center versions 7.x ant\u00e9rieures \u00e0 la version 7.19.18",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 7.x ant\u00e9rieures \u00e0 la version 7.19.18",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Confluence Server versions 8.5.x ant\u00e9rieures \u00e0 la version 8.5.5",
      "product": {
        "name": "Confluence",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center et Jira Service Management Server versions 5.x ant\u00e9rieures \u00e0 la version 5.12.2",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Service Management Data Center et Jira Service Management Server versions LTS 5.4.x ant\u00e9rieures \u00e0 la version 5.4.15",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    },
    {
      "description": "Jira Data Center et Jira Server versions LTS 9.4.x ant\u00e9rieures \u00e0 la version 9.4.13",
      "product": {
        "name": "Jira",
        "vendor": {
          "name": "Atlassian",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-21672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21672"
    },
    {
      "name": "CVE-2023-22527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22527"
    },
    {
      "name": "CVE-2022-42252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42252"
    },
    {
      "name": "CVE-2023-3635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
    },
    {
      "name": "CVE-2022-44729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44729"
    },
    {
      "name": "CVE-2020-25649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
    },
    {
      "name": "CVE-2023-22526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22526"
    },
    {
      "name": "CVE-2024-21673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21673"
    }
  ],
  "initial_release_date": "2024-01-16T00:00:00",
  "last_revision_date": "2024-01-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0040",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-01-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Atlassian\nConfluence et Jira. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Atlassian Confluence et Jira",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian 1333335615 du 16 janvier 2024",
      "url": "https://confluence.atlassian.com/security/security-bulletin-january-16-2024-1333335615.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Atlassian 1333990257 du 16 janvier 2024",
      "url": "https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html"
    }
  ]
}

CVE-2019-15013 (GCVE-0-2019-15013)

Vulnerability from cvelistv5 – Published: 2019-12-18 03:30 – Updated: 2024-09-16 16:57
VLAI?
Summary
The WorkflowResource class removeStatus method in Jira before version 7.13.12, from version 8.0.0 before version 8.4.3, and from version 8.5.0 before version 8.5.2 allows authenticated remote attackers who do not have project administration access to remove a configured issue status from a project via a missing authorisation check.
Severity ?
No CVSS data available.
CWE
  • Improper Authorization
Assigner
References
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 7.13.12 (custom)
Affected: 8.0.0 , < unspecified (custom)
Affected: unspecified , < 8.4.3 (custom)
Affected: 8.5.0 , < unspecified (custom)
Affected: unspecified , < 8.5.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:34:53.218Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-70405"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "7.13.12",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.4.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "8.5.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.5.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-12-18T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The WorkflowResource class removeStatus method in Jira before version 7.13.12, from version 8.0.0 before version 8.4.3, and from version 8.5.0 before version 8.5.2 allows authenticated remote attackers who do not have project administration access to remove a configured issue status from a project via a missing authorisation check."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper Authorization",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-18T03:30:12.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-70405"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-12-18T00:00:00",
          "ID": "CVE-2019-15013",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.13.12"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "8.0.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.4.3"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "8.5.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.5.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The WorkflowResource class removeStatus method in Jira before version 7.13.12, from version 8.0.0 before version 8.4.3, and from version 8.5.0 before version 8.5.2 allows authenticated remote attackers who do not have project administration access to remove a configured issue status from a project via a missing authorisation check."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Authorization"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-70405",
              "refsource": "MISC",
              "url": "https://jira.atlassian.com/browse/JRASERVER-70405"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-15013",
    "datePublished": "2019-12-18T03:30:12.315Z",
    "dateReserved": "2019-08-13T00:00:00.000Z",
    "dateUpdated": "2024-09-16T16:57:38.126Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8451 (GCVE-0-2019-8451)

Vulnerability from cvelistv5 – Published: 2019-09-11 13:56 – Updated: 2024-09-16 19:14
VLAI?
Summary
The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.
Severity ?
No CVSS data available.
CWE
  • Server-Side Request Forgery (SSRF)
Assigner
References
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 8.4.0 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:17:31.382Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69793"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "8.4.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-09-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-11T13:56:26.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69793"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-09-10T00:00:00",
          "ID": "CVE-2019-8451",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.4.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Server-Side Request Forgery (SSRF)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69793",
              "refsource": "CONFIRM",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69793"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-8451",
    "datePublished": "2019-09-11T13:56:26.397Z",
    "dateReserved": "2019-02-18T00:00:00.000Z",
    "dateUpdated": "2024-09-16T19:14:27.449Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8450 (GCVE-0-2019-8450)

Vulnerability from cvelistv5 – Published: 2019-09-11 13:56 – Updated: 2024-09-16 19:50
VLAI?
Summary
Various templates of the Optimization plugin in Jira before version 7.13.6, and from version 8.0.0 before version 8.4.0 allow remote attackers who have permission to manage custom fields to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a custom field.
Severity ?
No CVSS data available.
CWE
  • Cross Site Scripting (XSS)
Assigner
References
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 7.13.6 (custom)
Affected: 8.0.0 , < unspecified (custom)
Affected: unspecified , < 8.4.0 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:17:31.605Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69795"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "7.13.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.4.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-09-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Various templates of the Optimization plugin in Jira before version 7.13.6, and from version 8.0.0 before version 8.4.0 allow remote attackers who have permission to manage custom fields to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a custom field."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross Site Scripting (XSS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-11T13:56:26.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69795"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-09-10T00:00:00",
          "ID": "CVE-2019-8450",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.13.6"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "8.0.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.4.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Various templates of the Optimization plugin in Jira before version 7.13.6, and from version 8.0.0 before version 8.4.0 allow remote attackers who have permission to manage custom fields to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a custom field."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross Site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69795",
              "refsource": "CONFIRM",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69795"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-8450",
    "datePublished": "2019-09-11T13:56:26.352Z",
    "dateReserved": "2019-02-18T00:00:00.000Z",
    "dateUpdated": "2024-09-16T19:50:40.011Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8449 (GCVE-0-2019-8449)

Vulnerability from cvelistv5 – Published: 2019-09-11 13:56 – Updated: 2024-09-17 01:01
VLAI?
Summary
The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.
Severity ?
No CVSS data available.
CWE
  • Information Exposure
Assigner
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 8.4.0 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:17:31.450Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69796"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "8.4.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-09-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Exposure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-03T18:06:04.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69796"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-09-10T00:00:00",
          "ID": "CVE-2019-8449",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.4.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Exposure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69796",
              "refsource": "CONFIRM",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69796"
            },
            {
              "name": "http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-8449",
    "datePublished": "2019-09-11T13:56:26.301Z",
    "dateReserved": "2019-02-18T00:00:00.000Z",
    "dateUpdated": "2024-09-17T01:01:03.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14998 (GCVE-0-2019-14998)

Vulnerability from cvelistv5 – Published: 2019-09-11 13:56 – Updated: 2024-09-16 22:51
VLAI?
Summary
The Webwork action Cross-Site Request Forgery (CSRF) protection implementation in Jira before version 8.4.0 allows remote attackers to bypass its protection via "cookie tossing" a CSRF cookie from a subdomain of a Jira instance.
Severity ?
No CVSS data available.
CWE
  • N/A
Assigner
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 8.4.0 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:34:53.105Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69791"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "8.4.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-09-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Webwork action Cross-Site Request Forgery (CSRF) protection implementation in Jira before version 8.4.0 allows remote attackers to bypass its protection via \"cookie tossing\" a CSRF cookie from a subdomain of a Jira instance."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "N/A",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-16T18:06:11.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69791"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-09-10T00:00:00",
          "ID": "CVE-2019-14998",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.4.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Webwork action Cross-Site Request Forgery (CSRF) protection implementation in Jira before version 8.4.0 allows remote attackers to bypass its protection via \"cookie tossing\" a CSRF cookie from a subdomain of a Jira instance."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "N/A"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69791",
              "refsource": "CONFIRM",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69791"
            },
            {
              "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835",
              "refsource": "MISC",
              "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0835"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-14998",
    "datePublished": "2019-09-11T13:56:26.253Z",
    "dateReserved": "2019-08-13T00:00:00.000Z",
    "dateUpdated": "2024-09-16T22:51:07.147Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14997 (GCVE-0-2019-14997)

Vulnerability from cvelistv5 – Published: 2019-09-11 13:56 – Updated: 2024-09-16 18:44
VLAI?
Summary
The AccessLogFilter class in Jira before version 8.4.0 allows remote anonymous attackers to learn details about other users, including their username, via an information expose through caching vulnerability when Jira is configured with a reverse Proxy and or a load balancer with caching or a CDN.
Severity ?
No CVSS data available.
CWE
  • CWE-524 - Information Exposure Through Caching (CWE-524)
Assigner
References
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 8.4.0 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:34:53.000Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69794"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "8.4.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-09-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The AccessLogFilter class in Jira before version 8.4.0 allows remote anonymous attackers to learn details about other users, including their username, via an information expose through caching vulnerability when Jira is configured with a reverse Proxy and or a load balancer with caching or a CDN."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-524",
              "description": "Information Exposure Through Caching (CWE-524)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-11T13:56:26.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69794"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-09-10T00:00:00",
          "ID": "CVE-2019-14997",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.4.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The AccessLogFilter class in Jira before version 8.4.0 allows remote anonymous attackers to learn details about other users, including their username, via an information expose through caching vulnerability when Jira is configured with a reverse Proxy and or a load balancer with caching or a CDN."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Exposure Through Caching (CWE-524)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69794",
              "refsource": "CONFIRM",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69794"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-14997",
    "datePublished": "2019-09-11T13:56:26.203Z",
    "dateReserved": "2019-08-13T00:00:00.000Z",
    "dateUpdated": "2024-09-16T18:44:06.559Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14996 (GCVE-0-2019-14996)

Vulnerability from cvelistv5 – Published: 2019-09-11 13:56 – Updated: 2024-09-16 18:34
VLAI?
Summary
The FilterPickerPopup.jspa resource in Jira before version 7.13.7, and from version 8.0.0 before version 8.3.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter.
Severity ?
No CVSS data available.
CWE
  • Cross Site Scripting (XSS)
Assigner
References
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 7.13.7 (custom)
Affected: 8.0.0 , < unspecified (custom)
Affected: unspecified , < 8.3.3 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:34:53.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69790"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "7.13.7",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.3.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-09-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The FilterPickerPopup.jspa resource in Jira before version 7.13.7, and from version 8.0.0 before version 8.3.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross Site Scripting (XSS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-11T13:56:26.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69790"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-09-10T00:00:00",
          "ID": "CVE-2019-14996",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.13.7"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "8.0.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.3.3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The FilterPickerPopup.jspa resource in Jira before version 7.13.7, and from version 8.0.0 before version 8.3.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross Site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69790",
              "refsource": "CONFIRM",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69790"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-14996",
    "datePublished": "2019-09-11T13:56:26.155Z",
    "dateReserved": "2019-08-13T00:00:00.000Z",
    "dateUpdated": "2024-09-16T18:34:31.193Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-14995 (GCVE-0-2019-14995)

Vulnerability from cvelistv5 – Published: 2019-09-11 13:56 – Updated: 2024-09-16 18:24
VLAI?
Summary
The /rest/api/1.0/render resource in Jira before version 8.4.0 allows remote anonymous attackers to determine if an attachment with a specific name exists and if an issue key is valid via a missing permissions check.
Severity ?
No CVSS data available.
CWE
  • CWE-863 - Incorrect Authorization (CWE-863)
Assigner
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 8.4.0 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:34:53.143Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69792"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "8.4.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-09-10T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The /rest/api/1.0/render resource in Jira before version 8.4.0 allows remote anonymous attackers to determine if an attachment with a specific name exists and if an issue key is valid via a missing permissions check."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "Incorrect Authorization (CWE-863)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-16T18:06:12.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69792"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-09-10T00:00:00",
          "ID": "CVE-2019-14995",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.4.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The /rest/api/1.0/render resource in Jira before version 8.4.0 allows remote anonymous attackers to determine if an attachment with a specific name exists and if an issue key is valid via a missing permissions check."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Incorrect Authorization (CWE-863)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69792",
              "refsource": "CONFIRM",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69792"
            },
            {
              "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836",
              "refsource": "MISC",
              "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0836"
            },
            {
              "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837",
              "refsource": "MISC",
              "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0837"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-14995",
    "datePublished": "2019-09-11T13:56:26.083Z",
    "dateReserved": "2019-08-13T00:00:00.000Z",
    "dateUpdated": "2024-09-16T18:24:24.535Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8447 (GCVE-0-2019-8447)

Vulnerability from cvelistv5 – Published: 2019-08-23 13:49 – Updated: 2024-09-16 21:02
VLAI?
Summary
The ServiceExecutor resource in Jira before version 8.3.2 allows remote attackers to trigger the creation of export files via a Cross-site request forgery (CSRF) vulnerability.
Severity ?
No CVSS data available.
CWE
  • Cross-Site Request Forgery (CSRF)
Assigner
References
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 8.3.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:17:31.425Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69776"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "8.3.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ServiceExecutor resource in Jira before version 8.3.2 allows remote attackers to trigger the creation of export files via a Cross-site request forgery (CSRF) vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-23T13:49:47.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69776"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-08-13T00:00:00",
          "ID": "CVE-2019-8447",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.3.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ServiceExecutor resource in Jira before version 8.3.2 allows remote attackers to trigger the creation of export files via a Cross-site request forgery (CSRF) vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross-Site Request Forgery (CSRF)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69776",
              "refsource": "MISC",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69776"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-8447",
    "datePublished": "2019-08-23T13:49:47.940Z",
    "dateReserved": "2019-02-18T00:00:00.000Z",
    "dateUpdated": "2024-09-16T21:02:48.300Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8446 (GCVE-0-2019-8446)

Vulnerability from cvelistv5 – Published: 2019-08-23 13:49 – Updated: 2024-09-17 00:01
VLAI?
Summary
The /rest/issueNav/1/issueTable resource in Jira before version 8.3.2 allows remote attackers to enumerate usernames via an incorrect authorisation check.
Severity ?
No CVSS data available.
CWE
  • CWE-863 - Incorrect Authorization (CWE-863)
Assigner
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 8.3.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:17:31.572Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69777"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "8.3.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The /rest/issueNav/1/issueTable resource in Jira before version 8.3.2 allows remote attackers to enumerate usernames via an incorrect authorisation check."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "Incorrect Authorization (CWE-863)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-16T18:06:12.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69777"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-08-13T00:00:00",
          "ID": "CVE-2019-8446",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.3.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The /rest/issueNav/1/issueTable resource in Jira before version 8.3.2 allows remote attackers to enumerate usernames via an incorrect authorisation check."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Incorrect Authorization (CWE-863)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69777",
              "refsource": "MISC",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69777"
            },
            {
              "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839",
              "refsource": "MISC",
              "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-8446",
    "datePublished": "2019-08-23T13:49:47.890Z",
    "dateReserved": "2019-02-18T00:00:00.000Z",
    "dateUpdated": "2024-09-17T00:01:21.201Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8445 (GCVE-0-2019-8445)

Vulnerability from cvelistv5 – Published: 2019-08-23 13:49 – Updated: 2024-09-17 02:21
VLAI?
Summary
Several worklog rest resources in Jira before version 7.13.7, and from version 8.0.0 before version 8.3.2 allow remote attackers to view worklog time information via a missing permissions check.
Severity ?
No CVSS data available.
CWE
  • CWE-863 - Incorrect Authorization (CWE-863)
Assigner
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 7.13.7 (custom)
Affected: 8.0.0 , < unspecified (custom)
Affected: unspecified , < 8.3.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:17:31.449Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69778"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0840"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "7.13.7",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.3.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Several worklog rest resources in Jira before version 7.13.7, and from version 8.0.0 before version 8.3.2 allow remote attackers to view worklog time information via a missing permissions check."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "Incorrect Authorization (CWE-863)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-16T18:06:12.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69778"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0840"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-08-13T00:00:00",
          "ID": "CVE-2019-8445",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.13.7"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "8.0.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.3.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Several worklog rest resources in Jira before version 7.13.7, and from version 8.0.0 before version 8.3.2 allow remote attackers to view worklog time information via a missing permissions check."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Incorrect Authorization (CWE-863)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69778",
              "refsource": "MISC",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69778"
            },
            {
              "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0840",
              "refsource": "MISC",
              "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0840"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-8445",
    "datePublished": "2019-08-23T13:49:47.839Z",
    "dateReserved": "2019-02-18T00:00:00.000Z",
    "dateUpdated": "2024-09-17T02:21:53.651Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-8444 (GCVE-0-2019-8444)

Vulnerability from cvelistv5 – Published: 2019-08-23 13:49 – Updated: 2024-09-16 16:33
VLAI?
Summary
The wikirenderer component in Jira before version 7.13.6, and from version 8.0.0 before version 8.3.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in image attribute specification.
Severity ?
No CVSS data available.
CWE
  • Cross Site Scripting (XSS)
Assigner
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 7.13.6 (custom)
Affected: 8.0.0 , < unspecified (custom)
Affected: unspecified , < 8.3.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T21:17:31.480Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69779"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0833"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "7.13.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.3.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The wikirenderer component in Jira before version 7.13.6, and from version 8.0.0 before version 8.3.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in image attribute specification."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cross Site Scripting (XSS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-16T18:06:12.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69779"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0833"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-08-13T00:00:00",
          "ID": "CVE-2019-8444",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.13.6"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "8.0.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.3.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The wikirenderer component in Jira before version 7.13.6, and from version 8.0.0 before version 8.3.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in image attribute specification."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cross Site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69779",
              "refsource": "MISC",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69779"
            },
            {
              "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0833",
              "refsource": "MISC",
              "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0833"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-8444",
    "datePublished": "2019-08-23T13:49:47.797Z",
    "dateReserved": "2019-02-18T00:00:00.000Z",
    "dateUpdated": "2024-09-16T16:33:26.240Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-11589 (GCVE-0-2019-11589)

Vulnerability from cvelistv5 – Published: 2019-08-23 13:49 – Updated: 2024-09-17 04:05
VLAI?
Summary
The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user's Cross-site request forgery (CSRF) token, via a open redirect vulnerability.
Severity ?
No CVSS data available.
CWE
  • URL Redirection to Untrusted Site ('Open Redirect')
Assigner
References
Impacted products
Vendor Product Version
Atlassian Jira Affected: unspecified , < 7.13.6 (custom)
Affected: 8.0.0 , < unspecified (custom)
Affected: unspecified , < 8.2.3 (custom)
Affected: 8.3.0 , < unspecified (custom)
Affected: unspecified , < 8.3.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:55:41.046Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/JRASERVER-69780"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Jira",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "7.13.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.2.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "8.3.0",
              "versionType": "custom"
            },
            {
              "lessThan": "8.3.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-08-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user\u0027s Cross-site request forgery (CSRF) token, via a open redirect vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-23T13:49:47.000Z",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.atlassian.com/browse/JRASERVER-69780"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-08-13T00:00:00",
          "ID": "CVE-2019-11589",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Jira",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "7.13.6"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "8.0.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.2.3"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "8.3.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "8.3.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ChangeSharedFilterOwner resource in Jira before version 7.13.6, from version 8.0.0 before version 8.2.3, and from version 8.3.0 before version 8.3.2 allows remote attackers to attack users, in some cases be able to obtain a user\u0027s Cross-site request forgery (CSRF) token, via a open redirect vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/JRASERVER-69780",
              "refsource": "MISC",
              "url": "https://jira.atlassian.com/browse/JRASERVER-69780"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-11589",
    "datePublished": "2019-08-23T13:49:47.709Z",
    "dateReserved": "2019-04-29T00:00:00.000Z",
    "dateUpdated": "2024-09-17T04:05:01.224Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}