Vulnerability Description
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to continue to view cached content even after losing permissions, via a Broken Access Control vulnerability in the allowlist feature. The affected versions are before version 8.13.9, and from version 8.14.0 before 8.18.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Data Center | < 8.13.9 |
| Atlassian | Jira | < 8.13.9 |
| Atlassian | Jira Data Center | >= 8.14.0, < 8.18.0 |
| Atlassian | Jira Server | >= 8.14.0, < 8.18.0 |
Related Weaknesses (CWE)
References
- https://jira.atlassian.com/browse/JRASERVER-72573Issue TrackingVendor Advisory
- https://jira.atlassian.com/browse/JRASERVER-72573Issue TrackingVendor Advisory
FAQ
What is CVE-2021-39113?
CVE-2021-39113 is a vulnerability with a CVSS score of 7.5 (HIGH). Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to continue to view cached content even after losing permissions, via a Broken Access Control vulnerability ...
How severe is CVE-2021-39113?
CVE-2021-39113 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-39113?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Data Center, Atlassian Jira, Atlassian Jira Data Center, Atlassian Jira Server.