{"api_version":"1","generated_at":"2026-04-23T00:40:29+00:00","cve":"CVE-2021-43948","urls":{"html":"https://cve.report/CVE-2021-43948","api":"https://cve.report/api/cve/CVE-2021-43948.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43948","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43948"},"summary":{"title":"CVE-2021-43948","description":"Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to view the names of private objects via an Improper Authorization vulnerability in the \"Move objects\" feature. The affected versions are before version 4.21.0.","state":"PUBLIC","assigner":"security@atlassian.com","published_at":"2022-02-15 04:15:00","updated_at":"2022-07-12 17:42:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://jira.atlassian.com/browse/JSDSERVER-10981","name":"https://jira.atlassian.com/browse/JSDSERVER-10981","refsource":"MISC","tags":[],"title":"[JSDSERVER-10981] Names of private objects are leaked to unauthorized users via the \"Move objects\" feature - CVE-2021-43948 - Create and track feature requests for Atlassian products.","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43948","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43948","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43948","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"data_center","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43948","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"jira","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43948","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"jira_service_management","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"data_center","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43948","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"jira_service_management","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"server","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-43948","qid":"730370","title":"Atlassian Jira Server and Data Center Broken Access Control Vulnerability (JSDSERVER-10981)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@atlassian.com","DATE_PUBLIC":"2022-01-05T00:00:00","ID":"CVE-2021-43948","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Jira Service Management Server","version":{"version_data":[{"version_value":"4.21.0","version_affected":"<"}]}},{"product_name":"Jira Service Management Data Center","version":{"version_data":[{"version_value":"4.21.0","version_affected":"<"}]}}]},"vendor_name":"Atlassian"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to view the names of private objects via an Improper Authorization vulnerability in the \"Move objects\" feature. The affected versions are before version 4.21.0."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Authorization"}]}]},"references":{"reference_data":[{"url":"https://jira.atlassian.com/browse/JSDSERVER-10981","refsource":"MISC","name":"https://jira.atlassian.com/browse/JSDSERVER-10981"}]}},"nvd":{"publishedDate":"2022-02-15 04:15:00","lastModifiedDate":"2022-07-12 17:42:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*","versionEndExcluding":"4.21.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*","versionEndExcluding":"4.21.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43948","Ordinal":"221567","Title":"CVE-2021-43948","CVE":"CVE-2021-43948","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43948","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}