CVE-2020-36238
Summary
| CVE | CVE-2020-36238 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-04-01 03:15:00 UTC |
| Updated | 2022-09-20 19:28:00 UTC |
| Description | The /rest/api/1.0/render resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a username is valid or not via a missing permissions check. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [JRASERVER-72249] Username Enumeration through the render api resource - CVE-2020-36238 - Create and track feature requests for Atlassian products. |
MISC |
jira.atlassian.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 730104 Atlassian Jira Server Multiple Security Vulnerabilities (JRASERVER-72249, JRASERVER-72233)