Vulnerability Description
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Jira Data Center | < 8.5.14 |
| Atlassian | Jira Server | < 8.5.14 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.ExploitThird Party AdvisoryVDB Entry
- https://jira.atlassian.com/browse/JRASERVER-72695Issue TrackingVendor Advisory
- http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.ExploitThird Party AdvisoryVDB Entry
- https://jira.atlassian.com/browse/JRASERVER-72695Issue TrackingVendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-US Government Resource
FAQ
What is CVE-2021-26086?
CVE-2021-26086 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions ar...
How severe is CVE-2021-26086?
CVE-2021-26086 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-26086?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Jira Data Center, Atlassian Jira Server.