Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "C4E14497-BE54-41E5-BE0C-C9CB84D2A2C9", "versionEndExcluding": "7.13.18", "vulnerable": true}, {"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:server:*:*:*", "matchCriteriaId": "E43F04A4-FFD8-4EF0-A64B-67A7390FBE9B", "versionEndExcluding": "7.13.18", "vulnerable": true}, {"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "747BDDBB-A75C-48C7-A907-3514EA0AE9ED", "versionEndExcluding": "8.5.9", "versionStartIncluding": "8.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:server:*:*:*", "matchCriteriaId": "C5C7FD5B-E968-4162-AAE6-872577B08A25", "versionEndExcluding": "8.5.9", "versionStartIncluding": "8.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "C55C6477-FB8F-4B94-85C4-EE765B0FBC54", "versionEndExcluding": "8.12.1", "versionStartIncluding": "8.6.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:server:*:*:*", "matchCriteriaId": "B53EB7A4-2303-4F3C-A6C1-58E4DC85BEB2", "versionEndExcluding": "8.12.1", "versionStartIncluding": "8.6.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Affected versions of Jira Server & Data Center allow a remote attacker with limited (non-admin) privileges to view a Jira instance's Support Entitlement Number (SEN) via an Information Disclosure vulnerability in the HTTP Response headers. The affected versions are before version 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before 8.12.1."}, {"lang": "es", "value": "Las versiones afectadas de Jira Server & Data Center, permiten a un atacante remoto con privilegios limitados (no de administrador) visualizar el Support Entitlement Number (SEN) de una instancia de Jira por medio de una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en los encabezados HTTP Response. Las versiones afectadas son anteriores a la versi\u00f3n 7.13.18, desde versi\u00f3n 8.0.0 anteriores a 8.5.9 y desde versi\u00f3n 8.6.0 anteriores a 8.12.1"}], "id": "CVE-2020-14183", "lastModified": "2024-11-21T05:02:49.540", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-10-06T23:15:12.040", "references": [{"source": "security@atlassian.com", "tags": ["Permissions Required", "Vendor Advisory"], "url": "https://jira.atlassian.com/browse/JRASERVER-71646"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Permissions Required", "Vendor Advisory"], "url": "https://jira.atlassian.com/browse/JRASERVER-71646"}], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-200"}], "source": "nvd@nist.gov", "type": "Primary"}]}