5.3
CVSSv3

CVE-2021-26086

Published: 16/08/2021 Updated: 30/03/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Affected versions of Atlassian Jira Server and Data Center allow remote malicious users to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 prior to 8.13.6, and from version 8.14.0 prior to 8.16.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian jira data center

atlassian jira server

Exploits

Atlassian Jira Server/Data Center version 840 suffers from a limited remote file read vulnerability ...

Github Repositories

Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)

CVE-2021-26086 Atlassian Jira Server/Data Center 840 - Limited Remote File Read/Include Vulnerable Endpoints: WEB-INF/webxml WEB-INF/decoratorsxml WEB-INF/classes/seraph-configxml META-INF/maven/comatlassianjira/jira-webapp-dist/pomproperties META-INF/maven/comatlassianjira/jira-webapp-dist/pomxml META-INF/maven/comatlassianjira/atlassian-jira-webapp/pomxml META-I