Vulnerability Description
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability in the /secure/admin/RestoreDefaults.jspa endpoint. The affected versions are before version 8.21.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Jira Data Center | < 8.13.18 |
| Atlassian | Jira Server | < 8.13.18 |
Related Weaknesses (CWE)
References
- https://jira.atlassian.com/browse/JRASERVER-73138Issue TrackingVendor Advisory
- https://jira.atlassian.com/browse/JRASERVER-73138Issue TrackingVendor Advisory
FAQ
What is CVE-2021-43952?
CVE-2021-43952 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to restore the default configuration of fields via a Cross-Site Request Forgery (CSRF) vulnerability i...
How severe is CVE-2021-43952?
CVE-2021-43952 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-43952?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Jira Data Center, Atlassian Jira Server.