Vulnerability Description
Many resources in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3, from version 7.11.0 before version 7.11.3, from version 7.12.0 before version 7.12.3, and before version 7.13.1 allow remote attackers to attack users, in some cases be able to obtain a user's Cross-site request forgery (CSRF) token, via a open redirect vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Jira | < 7.6.9 |
| Atlassian | Jira Server | >= 7.7.0, < 7.7.5 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105751Third Party AdvisoryVDB Entry
- https://jira.atlassian.com/browse/JRASERVER-68140Issue TrackingVendor Advisory
- http://www.securityfocus.com/bid/105751Third Party AdvisoryVDB Entry
- https://jira.atlassian.com/browse/JRASERVER-68140Issue TrackingVendor Advisory
FAQ
What is CVE-2018-13402?
CVE-2018-13402 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Many resources in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 be...
How severe is CVE-2018-13402?
CVE-2018-13402 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-13402?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Jira, Atlassian Jira Server.