Vulnerability Description
Various administrative external system import resources in Atlassian JIRA Server (including JIRA Core) before version 7.6.5, from version 7.7.0 before version 7.7.3, from version 7.8.0 before version 7.8.3 and before version 7.9.0 allow remote attackers to run import operations and to determine if an internal service exists through missing permission checks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Jira | < 7.6.5 |
| Atlassian | Jira Server | >= 7.7.0, < 7.7.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/103730Broken Link
- https://jira.atlassian.com/browse/JRASERVER-67107Vendor Advisory
- http://www.securityfocus.com/bid/103730Broken Link
- https://jira.atlassian.com/browse/JRASERVER-67107Vendor Advisory
FAQ
What is CVE-2017-18101?
CVE-2017-18101 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Various administrative external system import resources in Atlassian JIRA Server (including JIRA Core) before version 7.6.5, from version 7.7.0 before version 7.7.3, from version 7.8.0 before version ...
How severe is CVE-2017-18101?
CVE-2017-18101 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-18101?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Jira, Atlassian Jira Server.