Vulnerability Description
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Data Center | < 8.13.3 |
| Atlassian | Jira | < 8.13.3 |
| Atlassian | Jira Server | >= 8.14.0, < 8.14.1 |
Related Weaknesses (CWE)
References
- https://jira.atlassian.com/browse/JRASERVER-72029Vendor Advisory
- https://jira.atlassian.com/browse/JRASERVER-72029Vendor Advisory
FAQ
What is CVE-2021-26070?
CVE-2021-26070 is a vulnerability with a CVSS score of 7.2 (HIGH). Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `make...
How severe is CVE-2021-26070?
CVE-2021-26070 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-26070?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Data Center, Atlassian Jira, Atlassian Jira Server.