Published: 20/04/2010 Updated: 17/08/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in Atlassian JIRA 3.12 up to and including 4.1 allow remote malicious users to inject arbitrary web script or HTML via the (1) element or (2) defaultColor parameter to the Colour Picker page; the (3) formName parameter, (4) element parameter, or (5) full name field to the User Picker page; the (6) formName parameter, (7) element parameter, or (8) group name field to the Group Picker page; the (9) announcement_preview_banner_st parameter to unspecified components, related to the Announcement Banner Preview page; unspecified vectors involving the (10) groupnames.jsp, (11) indexbrowser.jsp, (12) classpath-debug.jsp, (13) viewdocument.jsp, or (14) cleancommentspam.jsp page; the (15) portletKey parameter to runportleterror.jsp; the (16) URI to issuelinksmall.jsp; the (17) afterURL parameter to screenshot-redirecter.jsp; or the (18) HTTP Referrer header to 500page.jsp, as exploited in the wild in April 2010.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian jira 3.13.2

atlassian jira 4.0.2

atlassian jira 3.12

atlassian jira 4.0.1

atlassian jira 4.1

atlassian jira 3.13.3

atlassian jira 3.12.3

atlassian jira 3.13.5

atlassian jira 3.13.1

atlassian jira 3.12.2

atlassian jira 3.12.1

atlassian jira 3.13.4

atlassian jira 3.13

atlassian jira 4.0

Github Repositories

Reflections on Reflected XSS

Reflections on Reflected XSS This repository tracks real-world incidents where reflected XSS was exploited PR's welcome! Reflected XSS is among the most prevalent vulnerability classes discovered during web application security testing (penetration testing, code analysis, etc), but despite it prevalence, expolitaion of such vulnerabilities in real-world incidents seem to