Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2019-20100
PUBLISHED
More InfoOfficial Page
Assigner-atlassian
Assigner Org ID-f08a6ab8-ed46-4c22-8884-d911ccfe3c66
View Known Exploited Vulnerability (KEV) details
Published At-12 Feb, 2020 | 14:07
Updated At-17 Sep, 2024 | 00:40
Rejected At-
▼CVE Numbering Authority (CNA)

The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.

Affected Products
Vendor
AtlassianAtlassian
Product
Application Links
Versions
Affected
  • From unspecified before 5.4.21 (custom)
  • From 6.0.0 before unspecified (custom)
  • From unspecified before 6.0.12 (custom)
  • From 6.1.0 before unspecified (custom)
  • From unspecified before 6.1.2 (custom)
  • From 7.0.0 before unspecified (custom)
  • From unspecified before 7.0.2 (custom)
  • From 7.1.0 before unspecified (custom)
  • From unspecified before 7.1.3 (custom)
Vendor
AtlassianAtlassian
Product
Jira Server
Versions
Affected
  • From unspecified before 8.7.0 (custom)
Problem Types
TypeCWE IDDescription
textN/ACross Site Scripting (CSRF)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.tenable.com/security/research/tra-2020-06
x_refsource_MISC
https://ecosystem.atlassian.net/browse/APL-1390
x_refsource_MISC
https://jira.atlassian.com/browse/JRASERVER-70607
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.tenable.com/security/research/tra-2020-06
x_refsource_MISC
x_transferred
https://ecosystem.atlassian.net/browse/APL-1390
x_refsource_MISC
x_transferred
https://jira.atlassian.com/browse/JRASERVER-70607
x_refsource_MISC
x_transferred
Details not found