Vulnerabilites related to atlassian - troubleshooting_and_support
Vulnerability from fkie_nvd
Published
2019-11-08 04:15
Modified
2024-11-21 04:27
Severity ?
Summary
The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:troubleshooting_and_support:*:*:*:*:*:*:*:*", "matchCriteriaId": "093A33BE-D93B-4CBC-9BF3-B37207CBAD84", "versionEndExcluding": "1.17.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "A17D5A1F-2408-4768-9DC3-F850B21B64AD", "versionEndExcluding": "6.10.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF79AB35-E420-4475-AD28-FC219C636C8B", "versionEndExcluding": "6.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC203A88-CA6B-4F1A-A68D-9C2CDE8F67FC", "versionEndExcluding": "7.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*", "matchCriteriaId": "1361951B-0754-45FF-96E4-8A886C24411B", "versionEndExcluding": "3.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "matchCriteriaId": "40EB5F54-C9BD-4299-A616-E3A8E20C77FB", "versionEndExcluding": "4.7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*", "matchCriteriaId": "452D57FA-0A0B-486F-9D4B-45487B68FFB9", "versionEndExcluding": "4.7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "matchCriteriaId": "76FE371E-3000-464E-ADEE-033BF2989429", "versionEndExcluding": "8.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." }, { "lang": "es", "value": "El plugin Atlassian Troubleshooting and Support anterior a versi\u00f3n 1.17.2, permite a un usuario sin privilegios iniciar escaneos de registros peri\u00f3dicos y enviar los resultados a una direcci\u00f3n de correo electr\u00f3nico especificada por el usuario debido a una falta de comprobaci\u00f3n de autorizaci\u00f3n. El mensaje de correo electr\u00f3nico puede contener informaci\u00f3n de configuraci\u00f3n sobre la aplicaci\u00f3n en la que el plugin est\u00e1 instalado. Se incluye una versi\u00f3n vulnerable del plugin con Bitbucket Server/Data Center versiones anteriores a 6.6.0, Confluence Server / Data Center versiones anteriores a 7.0.1, Jira Server / Data Center versiones anteriores a 8.3.2, Crowd / Crowd Data Center versiones anteriores a 3.6.0, Fisheye versiones anteriores a 4.7.2, Crucible versiones anteriores a 4.7.2 y Bamboo versiones anteriores a 6.10.2." } ], "id": "CVE-2019-15005", "lastModified": "2024-11-21T04:27:51.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-08T04:15:10.307", "references": [ { "source": "security@atlassian.com", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BAM-20647" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2019-15005 (GCVE-0-2019-15005)
Vulnerability from cvelistv5
Published
2019-11-08 03:55
Modified
2024-09-16 20:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Improper Authorization
Summary
The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | Atlassian | Bitbucket Server |
Version: unspecified < 6.6.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "6.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.3.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "lessThan": "6.10.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:44:03", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-11-08T00:00:00", "ID": "CVE-2019-15005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.6.0" } ] } }, { "product_name": "Jira Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.3.2" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.0.1" } ] } }, { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.6.0" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Bamboo", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.10.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-20647", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "name": "https://herolab.usd.de/security-advisories/usd-2019-0016/", "refsource": "MISC", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15005", "datePublished": "2019-11-08T03:55:12.611106Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-16T20:31:42.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }