Vulnerabilites related to Atlassian - Fisheye and Crucible
CVE-2017-14591 (GCVE-0-2017-14591)
Vulnerability from cvelistv5
Published
2017-11-29 21:00
Modified
2024-09-16 20:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Arbitrary Code Execution
Summary
Atlassian Fisheye and Crucible versions less than 4.4.3 and version 4.5.0 are vulnerable to argument injection through filenames in Mercurial repositories, allowing attackers to execute arbitrary code on a system running the impacted software.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: Versions less than 4.4.3 OR version 4.5.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:34:38.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/x/plcGO" }, { "name": "102194", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102194" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "Versions less than 4.4.3 OR version 4.5.0" } ] } ], "datePublic": "2017-11-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Fisheye and Crucible versions less than 4.4.3 and version 4.5.0 are vulnerable to argument injection through filenames in Mercurial repositories, allowing attackers to execute arbitrary code on a system running the impacted software." } ], "problemTypes": [ { "descriptions": [ { "description": "Arbitrary Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-16T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/x/plcGO" }, { "name": "102194", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102194" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2017-11-29T00:00:00", "ID": "CVE-2017-14591", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_value": "Versions less than 4.4.3 OR version 4.5.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Fisheye and Crucible versions less than 4.4.3 and version 4.5.0 are vulnerable to argument injection through filenames in Mercurial repositories, allowing attackers to execute arbitrary code on a system running the impacted software." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Arbitrary Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://confluence.atlassian.com/x/plcGO", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/x/plcGO" }, { "name": "102194", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102194" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-14591", "datePublished": "2017-11-29T21:00:00Z", "dateReserved": "2017-09-19T00:00:00", "dateUpdated": "2024-09-16T20:46:54.683Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18094 (GCVE-0-2017-18094)
Vulnerability from cvelistv5
Published
2018-03-22 13:00
Modified
2024-09-16 18:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and 4.5.0 allow remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the base path setting of a configured file system repository.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: prior to 4.4.3 Version: prior to 4.5.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7010" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 4.4.3" }, { "status": "affected", "version": "prior to 4.5.0" } ] } ], "datePublic": "2018-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and 4.5.0 allow remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the base path setting of a configured file system repository." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-22T12:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7010" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-19T00:00:00", "ID": "CVE-2017-18094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_value": "prior to 4.4.3" }, { "version_value": "prior to 4.5.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and 4.5.0 allow remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the base path setting of a configured file system repository." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/FE-7010", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7010" }, { "name": "https://jira.atlassian.com/browse/CRUC-8177", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8177" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18094", "datePublished": "2018-03-22T13:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T18:28:38.668Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18091 (GCVE-0-2017-18091)
Vulnerability from cvelistv5
Published
2018-02-16 18:00
Modified
2024-09-16 20:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
The admin backupprogress action in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allows remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the filename of a backup.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: prior to 4.4.3 Version: prior to 4.5.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:47.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7006" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8173" }, { "name": "103079", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 4.4.3" }, { "status": "affected", "version": "prior to 4.5.0" } ] } ], "datePublic": "2018-02-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The admin backupprogress action in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allows remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the filename of a backup." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-21T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7006" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8173" }, { "name": "103079", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-16T00:00:00", "ID": "CVE-2017-18091", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_value": "prior to 4.4.3" }, { "version_value": "prior to 4.5.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The admin backupprogress action in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allows remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the filename of a backup." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/FE-7006", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7006" }, { "name": "https://jira.atlassian.com/browse/CRUC-8173", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8173" }, { "name": "103079", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103079" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18091", "datePublished": "2018-02-16T18:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T20:22:54.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5223 (GCVE-0-2018-5223)
Vulnerability from cvelistv5
Published
2018-03-29 13:00
Modified
2024-09-16 19:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Argument Injection
Summary
Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.4.6 Version: 4.5.0 < unspecified Version: unspecified < 4.5.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:26:47.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/x/aS5sO" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8181" }, { "name": "103665", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103665" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/x/Zi5sO" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.4.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.5.0", "versionType": "custom" }, { "lessThan": "4.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-05T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/x/aS5sO" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8181" }, { "name": "103665", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103665" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/x/Zi5sO" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7014" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-03-28T00:00:00", "ID": "CVE-2018-5223", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.4.6" }, { "version_affected": "\u003e=", "version_value": "4.5.0" }, { "version_affected": "\u003c", "version_value": "4.5.3" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://confluence.atlassian.com/x/aS5sO", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/x/aS5sO" }, { "name": "https://jira.atlassian.com/browse/CRUC-8181", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8181" }, { "name": "103665", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103665" }, { "name": "https://confluence.atlassian.com/x/Zi5sO", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/x/Zi5sO" }, { "name": "https://jira.atlassian.com/browse/FE-7014", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7014" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-5223", "datePublished": "2018-03-29T13:00:00Z", "dateReserved": "2018-01-05T00:00:00", "dateUpdated": "2024-09-16T19:56:55.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13399 (GCVE-0-2018-13399)
Vulnerability from cvelistv5
Published
2018-10-16 13:00
Modified
2024-09-16 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Incorrect Permission Assignment for Critical Resource
Summary
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.6.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7105" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8314" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.6.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-09-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T12:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7105" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8314" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-09-28T00:00:00", "ID": "CVE-2018-13399", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.6.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/FE-7105", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7105" }, { "name": "https://jira.atlassian.com/browse/CRUC-8314", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8314" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13399", "datePublished": "2018-10-16T13:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-16T20:21:40.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20240 (GCVE-0-2018-20240)
Vulnerability from cvelistv5
Published
2019-02-20 15:00
Modified
2024-09-17 00:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
The administrative linker functionality in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the href parameter.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.812Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7163" }, { "name": "107128", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8381" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The administrative linker functionality in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the href parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7163" }, { "name": "107128", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8381" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-02-15T00:00:00", "ID": "CVE-2018-20240", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administrative linker functionality in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the href parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/FE-7163", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7163" }, { "name": "107128", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107128" }, { "name": "https://jira.atlassian.com/browse/CRUC-8381", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8381" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-20240", "datePublished": "2019-02-20T15:00:00Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-17T00:15:39.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18093 (GCVE-0-2017-18093)
Vulnerability from cvelistv5
Published
2018-02-19 14:00
Modified
2024-09-17 02:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allow remote attackers who have permission to add or modify a repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the location setting of a configured repository.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: prior to 4.4.3 Version: prior to 4.5.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103095", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8175" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7008" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 4.4.3" }, { "status": "affected", "version": "prior to 4.5.0" } ] } ], "datePublic": "2018-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allow remote attackers who have permission to add or modify a repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the location setting of a configured repository." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-22T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "103095", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8175" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7008" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-19T00:00:00", "ID": "CVE-2017-18093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_value": "prior to 4.4.3" }, { "version_value": "prior to 4.5.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allow remote attackers who have permission to add or modify a repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the location setting of a configured repository." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "103095", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103095" }, { "name": "https://jira.atlassian.com/browse/CRUC-8175", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8175" }, { "name": "https://jira.atlassian.com/browse/FE-7008", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7008" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18093", "datePublished": "2018-02-19T14:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-17T02:11:00.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5228 (GCVE-0-2018-5228)
Vulnerability from cvelistv5
Published
2018-04-24 12:00
Modified
2024-09-17 00:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.5.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:42.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7035" }, { "name": "104006", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104006" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8201" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-04-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-28T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7035" }, { "name": "104006", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104006" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8201" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-04-23T00:00:00", "ID": "CVE-2018-5228", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.5.3" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/FE-7035", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7035" }, { "name": "104006", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104006" }, { "name": "https://jira.atlassian.com/browse/CRUC-8201", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8201" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-5228", "datePublished": "2018-04-24T12:00:00Z", "dateReserved": "2018-01-05T00:00:00", "dateUpdated": "2024-09-17T00:51:54.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18035 (GCVE-0-2017-18035)
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-09-16 23:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control ()
Summary
The /rest/review-coverage-chart/1.0/data/<repository_name>/.json resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 was missing a permissions check, this allows remote attackers who do not have access to a particular repository to determine its existence and access review coverage statistics for it.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: prior to 4.5.1 and 4.6.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-6996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8163" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 4.5.1 and 4.6.0" } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The /rest/review-coverage-chart/1.0/data/\u003crepository_name\u003e/.json resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 was missing a permissions check, this allows remote attackers who do not have access to a particular repository to determine its existence and access review coverage statistics for it." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control (CWE-284)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T13:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-6996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8163" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-01-18T00:00:00", "ID": "CVE-2017-18035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_value": "prior to 4.5.1 and 4.6.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The /rest/review-coverage-chart/1.0/data/\u003crepository_name\u003e/.json resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 was missing a permissions check, this allows remote attackers who do not have access to a particular repository to determine its existence and access review coverage statistics for it." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control (CWE-284)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/FE-6996", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-6996" }, { "name": "https://jira.atlassian.com/browse/CRUC-8163", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8163" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18035", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-09-16T23:30:24.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13392 (GCVE-0-2018-13392)
Vulnerability from cvelistv5
Published
2018-08-13 13:00
Modified
2024-09-16 23:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
Several resources in Atlassian Fisheye and Crucible before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in linked issue keys.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.6.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8304" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7081" }, { "name": "105096", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105096" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-08-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Several resources in Atlassian Fisheye and Crucible before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in linked issue keys." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-17T09:57:02", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8304" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7081" }, { "name": "105096", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105096" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-08-13T00:00:00", "ID": "CVE-2018-13392", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.6.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several resources in Atlassian Fisheye and Crucible before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in linked issue keys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CRUC-8304", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8304" }, { "name": "https://jira.atlassian.com/browse/FE-7081", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7081" }, { "name": "105096", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105096" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13392", "datePublished": "2018-08-13T13:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-16T23:55:30.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16861 (GCVE-0-2017-16861)
Vulnerability from cvelistv5
Published
2018-02-01 04:00
Modified
2024-09-16 22:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Remote Code Execution
Summary
It was possible for double OGNL evaluation in certain redirect action and in WebWork URL and Anchor tags in JSP files to occur. An attacker who can access the web interface of Fisheye or Crucible or who hosts a website that a user who can access the web interface of Fisheye or Crucible visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Fisheye or Crucible. All versions of Fisheye and Crucible before 4.4.5 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.2 (the fixed version for 4.5.x) are affected by this vulnerability.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: prior to 4.4.5 Version: 4.5.0 prior to 4.5.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.220Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8156" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://confluence.atlassian.com/x/h-QyO" }, { "name": "102971", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102971" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://confluence.atlassian.com/x/iPQyO" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-6991" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 4.4.5" }, { "status": "affected", "version": "4.5.0 prior to 4.5.2" } ] } ], "datePublic": "2018-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "It was possible for double OGNL evaluation in certain redirect action and in WebWork URL and Anchor tags in JSP files to occur. An attacker who can access the web interface of Fisheye or Crucible or who hosts a website that a user who can access the web interface of Fisheye or Crucible visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Fisheye or Crucible. All versions of Fisheye and Crucible before 4.4.5 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.2 (the fixed version for 4.5.x) are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-10T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CRUC-8156" }, { "tags": [ "x_refsource_MISC" ], "url": "https://confluence.atlassian.com/x/h-QyO" }, { "name": "102971", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102971" }, { "tags": [ "x_refsource_MISC" ], "url": "https://confluence.atlassian.com/x/iPQyO" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/FE-6991" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-01-31T00:00:00", "ID": "CVE-2017-16861", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_value": "prior to 4.4.5" }, { "version_value": "4.5.0 prior to 4.5.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was possible for double OGNL evaluation in certain redirect action and in WebWork URL and Anchor tags in JSP files to occur. An attacker who can access the web interface of Fisheye or Crucible or who hosts a website that a user who can access the web interface of Fisheye or Crucible visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Fisheye or Crucible. All versions of Fisheye and Crucible before 4.4.5 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.2 (the fixed version for 4.5.x) are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CRUC-8156", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CRUC-8156" }, { "name": "https://confluence.atlassian.com/x/h-QyO", "refsource": "MISC", "url": "https://confluence.atlassian.com/x/h-QyO" }, { "name": "102971", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102971" }, { "name": "https://confluence.atlassian.com/x/iPQyO", "refsource": "MISC", "url": "https://confluence.atlassian.com/x/iPQyO" }, { "name": "https://jira.atlassian.com/browse/FE-6991", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/FE-6991" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-16861", "datePublished": "2018-02-01T04:00:00Z", "dateReserved": "2017-11-16T00:00:00", "dateUpdated": "2024-09-16T22:56:24.722Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18034 (GCVE-0-2017-18034)
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-09-16 17:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
The source browse resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 allows allows remote attackers that have write access to an indexed repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in via a specially crafted repository branch name when trying to display deleted files of the branch.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: prior to 4.5.1 and 4.6.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-6994" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8161" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 4.5.1 and 4.6.0" } ] } ], "datePublic": "2018-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The source browse resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 allows allows remote attackers that have write access to an indexed repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in via a specially crafted repository branch name when trying to display deleted files of the branch." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-25T13:56:32", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-6994" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8161" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-01-18T00:00:00", "ID": "CVE-2017-18034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_value": "prior to 4.5.1 and 4.6.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The source browse resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 allows allows remote attackers that have write access to an indexed repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in via a specially crafted repository branch name when trying to display deleted files of the branch." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/FE-6994", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-6994" }, { "name": "https://jira.atlassian.com/browse/CRUC-8161", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8161" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18034", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-09-16T17:38:29.337Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16859 (GCVE-0-2017-16859)
Vulnerability from cvelistv5
Published
2018-06-28 14:00
Modified
2024-09-16 17:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Path Traversal
Summary
The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.3.2 Version: 4.4.0 < unspecified Version: unspecified < 4.4.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8212" }, { "name": "104578", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104578" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7061" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-06-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-29T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8212" }, { "name": "104578", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104578" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7061" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-06-28T00:00:00", "ID": "CVE-2017-16859", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.2" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.3" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CRUC-8212", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8212" }, { "name": "104578", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104578" }, { "name": "https://jira.atlassian.com/browse/FE-7061", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7061" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-16859", "datePublished": "2018-06-28T14:00:00Z", "dateReserved": "2017-11-16T00:00:00", "dateUpdated": "2024-09-16T17:15:00.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20241 (GCVE-0-2018-20241)
Vulnerability from cvelistv5
Published
2019-02-20 15:00
Modified
2024-09-17 00:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
The Edit upload resource for a review in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the wbuser parameter.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107128", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8380" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The Edit upload resource for a review in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the wbuser parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "107128", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8380" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-02-15T00:00:00", "ID": "CVE-2018-20241", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Edit upload resource for a review in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the wbuser parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "107128", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107128" }, { "name": "https://jira.atlassian.com/browse/CRUC-8380", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8380" }, { "name": "https://jira.atlassian.com/browse/FE-7162", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7162" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-20241", "datePublished": "2019-02-20T15:00:00Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-17T00:31:10.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13388 (GCVE-0-2018-13388)
Vulnerability from cvelistv5
Published
2018-07-10 13:00
Modified
2024-09-17 01:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross Site Scripting (XSS)
Summary
The review attachment resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in attached files.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.5.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8209" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7059" }, { "name": "104717", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104717" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The review attachment resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in attached files." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-12T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8209" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7059" }, { "name": "104717", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104717" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-07-09T00:00:00", "ID": "CVE-2018-13388", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.5.3" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The review attachment resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in attached files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CRUC-8209", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8209" }, { "name": "https://jira.atlassian.com/browse/FE-7059", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7059" }, { "name": "104717", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104717" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13388", "datePublished": "2018-07-10T13:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-17T01:40:46.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13398 (GCVE-0-2018-13398)
Vulnerability from cvelistv5
Published
2018-09-18 14:00
Modified
2024-09-16 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-Site Request Forgery (CSRF)
Summary
The administrative smart-commits resource in Atlassian Fisheye and Crucible before version 4.5.4 allows remote attackers to modify smart-commit settings via a Cross-site request forgery (CSRF) vulnerability.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Fisheye and Crucible |
Version: unspecified < 4.5.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7100" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8312" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Fisheye and Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.5.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The administrative smart-commits resource in Atlassian Fisheye and Crucible before version 4.5.4 allows remote attackers to modify smart-commit settings via a Cross-site request forgery (CSRF) vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-18T13:57:02", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/FE-7100" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CRUC-8312" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-09-17T00:00:00", "ID": "CVE-2018-13398", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fisheye and Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.5.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The administrative smart-commits resource in Atlassian Fisheye and Crucible before version 4.5.4 allows remote attackers to modify smart-commit settings via a Cross-site request forgery (CSRF) vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/FE-7100", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/FE-7100" }, { "name": "https://jira.atlassian.com/browse/CRUC-8312", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CRUC-8312" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13398", "datePublished": "2018-09-18T14:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-16T18:34:54.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }