Vulnerability Description
The issue collector in Atlassian Jira before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4 and from version 7.9.0 before version 7.9.2 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the error message of custom fields when an invalid value is specified.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Jira | < 7.6.6 |
| Atlassian | Jira Server | >= 7.7.0, < 7.7.4 |
Related Weaknesses (CWE)
References
- https://jira.atlassian.com/browse/JRASERVER-67289Issue TrackingVendor Advisory
- https://jira.atlassian.com/browse/JRASERVER-67289Issue TrackingVendor Advisory
FAQ
What is CVE-2018-5230?
CVE-2018-5230 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The issue collector in Atlassian Jira before version 7.6.6, from version 7.7.0 before version 7.7.4, from version 7.8.0 before version 7.8.4 and from version 7.9.0 before version 7.9.2 allows remote a...
How severe is CVE-2018-5230?
CVE-2018-5230 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-5230?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Jira, Atlassian Jira Server.