{"api_version":"1","generated_at":"2026-04-23T02:35:24+00:00","cve":"CVE-2019-20105","urls":{"html":"https://cve.report/CVE-2019-20105","api":"https://cve.report/api/cve/CVE-2019-20105.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-20105","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-20105"},"summary":{"title":"CVE-2019-20105","description":"The EditApplinkServlet resource in the Atlassian Application Links plugin before version 5.4.20, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.1, and from version 7.1.0 before version 7.1.3 allows remote attackers who have obtained access to administrator's session to access the EditApplinkServlet resource without needing to re-authenticate to pass \"WebSudo\" in products that support \"WebSudo\" through an improper access control vulnerability.","state":"PUBLIC","assigner":"security@atlassian.com","published_at":"2020-03-17 03:15:00","updated_at":"2020-08-24 17:37:00"},"problem_types":["CWE-306"],"metrics":[],"references":[{"url":"https://ecosystem.atlassian.net/browse/APL-1391","name":"https://ecosystem.atlassian.net/browse/APL-1391","refsource":"MISC","tags":["Vendor Advisory"],"title":"[APL-1391] Authorisation bypass in the ViewUpgrades resource - CVE-2019-20105 - Ecosystem Jira","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://jira.atlassian.com/browse/JRASERVER-70526","name":"https://jira.atlassian.com/browse/JRASERVER-70526","refsource":"MISC","tags":["Vendor Advisory"],"title":"[JRASERVER-70526] Improper Authorization in Applinks - CVE-2019-20105 - Create and track feature requests for Atlassian products.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-20105","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-20105","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"20105","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"application_links","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"20105","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"application_links","cpe6":"7.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"20105","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"application_links","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"20105","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"application_links","cpe6":"7.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"20105","vulnerable":"1","versionEndIncluding":"5.4.20","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"application_links","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"20105","vulnerable":"1","versionEndIncluding":"6.0.12","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"application_links","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@atlassian.com","DATE_PUBLIC":"2020-03-17T00:00:00","ID":"CVE-2019-20105","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Application Links","version":{"version_data":[{"version_value":"5.4.20","version_affected":"<"},{"version_value":"6.0.0","version_affected":">="},{"version_value":"6.0.12","version_affected":"<"},{"version_value":"7.0.0","version_affected":">="},{"version_value":"7.0.1","version_affected":"<"},{"version_value":"7.1.0","version_affected":">="},{"version_value":"7.1.3","version_affected":"<"}]}},{"product_name":"Jira Server and Data Center","version":{"version_data":[{"version_value":"7.13.8","version_affected":">="},{"version_value":"7.13.12","version_affected":"<"},{"version_value":"8.4.2","version_affected":">="},{"version_value":"8.5.4","version_affected":"<"},{"version_value":"8.6.0","version_affected":">="},{"version_value":"8.6.1","version_affected":"<"}]}}]},"vendor_name":"Atlassian"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The EditApplinkServlet resource in the Atlassian Application Links plugin before version 5.4.20, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.1, and from version 7.1.0 before version 7.1.3 allows remote attackers who have obtained access to administrator's session to access the EditApplinkServlet resource without needing to re-authenticate to pass \"WebSudo\" in products that support \"WebSudo\" through an improper access control vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Authorization"}]}]},"references":{"reference_data":[{"url":"https://ecosystem.atlassian.net/browse/APL-1391","refsource":"MISC","name":"https://ecosystem.atlassian.net/browse/APL-1391"},{"url":"https://jira.atlassian.com/browse/JRASERVER-70526","refsource":"MISC","name":"https://jira.atlassian.com/browse/JRASERVER-70526"}]}},"nvd":{"publishedDate":"2020-03-17 03:15:00","lastModifiedDate":"2020-08-24 17:37:00","problem_types":["CWE-306"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*","versionStartIncluding":"7.1.0","versionEndExcluding":"7.1.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:application_links:7.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.12","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*","versionEndIncluding":"5.4.20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.0","versionEndExcluding":"6.1.2","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"20105","Ordinal":"164021","Title":"CVE-2019-20105","CVE":"CVE-2019-20105","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"20105","Ordinal":"1","NoteData":"The EditApplinkServlet resource in the Atlassian Application Links plugin before version 5.4.20, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.1, and from version 7.1.0 before version 7.1.3 allows remote attackers who have obtained access to administrator's session to access the EditApplinkServlet resource without needing to re-authenticate to pass \"WebSudo\" in products that support \"WebSudo\" through an improper access control vulnerability.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"20105","Ordinal":"2","NoteData":"2020-03-16","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"20105","Ordinal":"3","NoteData":"2020-03-16","Type":"Other","Title":"Modified"}]}}}