We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2019-20100



Description

The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF). The following versions are affected: all versions prior to 5.4.21, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.2, and from version 7.1.0 before version 7.1.3. The vulnerable plugin is used by Atlassian Jira Server and Data Center before version 8.7.0. An attacker could exploit this by tricking an administrative user into making malicious HTTP requests, allowing the attacker to enumerate hosts and open ports on the internal network where Jira server is present.

Reserved 2019-12-30 | Published 2020-02-12 | Updated 2024-09-17 | Assigner atlassian

Problem types

Cross Site Scripting (CSRF)

Product status

Any version before 5.4.21
affected

6.0.0 before unspecified
affected

Any version before 6.0.12
affected

6.1.0 before unspecified
affected

Any version before 6.1.2
affected

7.0.0 before unspecified
affected

Any version before 7.0.2
affected

7.1.0 before unspecified
affected

Any version before 7.1.3
affected

Any version before 8.7.0
affected

References

www.tenable.com/security/research/tra-2020-06

ecosystem.atlassian.net/browse/APL-1390

jira.atlassian.com/browse/JRASERVER-70607

cve.org (CVE-2019-20100)

nvd.nist.gov (CVE-2019-20100)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2019-20100

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.