A vulnerability in Mobile Plugin for Jira Data Center and Server allows a remote, authenticated user (including a user who joined via the sign-up feature) to perform a full read server-side request forgery via a batch endpoint. This affects Atlassian Jira Server and Data Center from version 8.0.0 before version 8.13.22, from version 8.14.0 before 8.20.10, from version 8.21.0 before 8.22.4. This also affects Jira Management Server and Data Center versions from version 4.0.0 before 4.13.22, from version 4.14.0 before 4.20.10 and from version 4.21.0 before 4.22.4.
History

Thu, 03 Oct 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: atlassian

Published: 2022-06-30T05:20:15.269358Z

Updated: 2024-10-29T15:20:52.789Z

Reserved: 2022-02-25T00:00:00

Link: CVE-2022-26135

cve-icon Vulnrichment

Updated: 2024-08-03T04:56:37.610Z

cve-icon NVD

Status : Modified

Published: 2022-06-30T06:15:07.693

Modified: 2024-11-21T06:53:30.093

Link: CVE-2022-26135

cve-icon Redhat

No data.