NA

CVE-2021-26079

Published: 07/06/2021 Updated: 30/03/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The CardLayoutConfigTable component in Jira Server and Jira Data Center before version 8.5.15, and from version 8.6.0 before version 8.13.7, and from version 8.14.0 prior to 8.17.0 allows remote malicious users to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian data center

atlassian jira data center

atlassian jira

atlassian jira server

Github Repositories

Use at your own risk CVE-2021-26079 Exploit Windows Binary PoC /CVE-2021-26079exe will run the exploit /CVE-2021-26079exe Target IP /CVE-2021-26079exe wwwexamplecom Running the exploit on Linux Change the target IP in CVE-2021-26079sh then do: chmod +x CVE-2021-26079sh /CVE-2021-26079sh Target IP /CVE-2021-26079sh wwwexam