Summary
Atlassian JIRA is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user- supplied input.
An attacker may leverage these issues to execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
Versions prior to Atlassian JIRA 4.2.1 are vulnerable.
Solution
Vendor updates are available. Please see the references for more information.
References
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting Vulnerability
- Apache Struts Cross Site Scripting Vulnerability
- Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability
- Aardvark Topsites <= 4.2.2 Remote File Inclusion Vulnerability
- AjaXplorer Remote Command Injection and Local File Disclosure Vulnerabilities