Learn about CVE-2020-14179 affecting Atlassian Jira Server versions before 8.5.8 and from 8.6.0 before 8.11.1. Discover the impact, technical details, and mitigation steps.
Atlassian Jira Server versions before 8.5.8 and from 8.6.0 before 8.11.1 are vulnerable to an Information Disclosure flaw that allows remote, unauthenticated attackers to access custom field and SLA names.
Understanding CVE-2020-14179
This CVE involves an Improper Authorization vulnerability in Atlassian Jira Server, potentially exposing sensitive information to unauthorized users.
What is CVE-2020-14179?
The CVE-2020-14179 vulnerability in Atlassian Jira Server enables attackers to view custom field names and SLA names without authentication through a specific endpoint.
The Impact of CVE-2020-14179
The vulnerability poses a risk of exposing sensitive data to unauthorized individuals, compromising the confidentiality of custom field and SLA names within the affected Jira Server versions.
Technical Details of CVE-2020-14179
This section provides detailed technical insights into the vulnerability.
Vulnerability Description
The flaw allows remote, unauthenticated attackers to access custom field names and SLA names via the /secure/QueryComponent!Default.jspa endpoint in Atlassian Jira Server.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability remotely without the need for authentication, potentially leading to unauthorized access to sensitive information.
Mitigation and Prevention
Protecting systems from CVE-2020-14179 requires immediate actions and long-term security measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates