{"api_version":"1","generated_at":"2026-04-22T22:49:46+00:00","cve":"CVE-2021-43951","urls":{"html":"https://cve.report/CVE-2021-43951","api":"https://cve.report/api/cve/CVE-2021-43951.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43951","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43951"},"summary":{"title":"CVE-2021-43951","description":"Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to view object import configuration details via an Information Disclosure vulnerability in the Create Object type mapping feature. The affected versions are before version 4.21.0.","state":"PUBLIC","assigner":"security@atlassian.com","published_at":"2022-01-10 16:15:00","updated_at":"2022-03-04 15:32:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"https://jira.atlassian.com/browse/JSDSERVER-10984","name":"https://jira.atlassian.com/browse/JSDSERVER-10984","refsource":"MISC","tags":[],"title":"[JSDSERVER-10984] Object import configuration details are leaked via the Create Object type mapping feature - CVE-2021-43951 - Create and track feature requests for Atlassian products.","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43951","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43951","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43951","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"data_center","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43951","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"jira_service_management","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43951","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"jira_service_management","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"data_center","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43951","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"atlassian","cpe5":"jira_service_management","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"server","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-43951","qid":"730463","title":"Atlassian Jira Service Management Server and Data Center Information Disclosure Vulnerability (JSDSERVER-10984)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@atlassian.com","DATE_PUBLIC":"2022-01-06T00:00:00","ID":"CVE-2021-43951","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Jira Service Management Server","version":{"version_data":[{"version_value":"4.21.0","version_affected":"<"}]}},{"product_name":"Jira Service Management Data Center","version":{"version_data":[{"version_value":"4.21.0","version_affected":"<"}]}}]},"vendor_name":"Atlassian"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to view object import configuration details via an Information Disclosure vulnerability in the Create Object type mapping feature. The affected versions are before version 4.21.0."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Authorization"}]}]},"references":{"reference_data":[{"url":"https://jira.atlassian.com/browse/JSDSERVER-10984","refsource":"MISC","name":"https://jira.atlassian.com/browse/JSDSERVER-10984"}]}},"nvd":{"publishedDate":"2022-01-10 16:15:00","lastModifiedDate":"2022-03-04 15:32:00","problem_types":["CWE-200"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*","versionEndExcluding":"4.21.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*","versionEndExcluding":"4.21.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43951","Ordinal":"221570","Title":"CVE-2021-43951","CVE":"CVE-2021-43951","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43951","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}