CVE-2010-1165
Published Apr 20, 2010
Last updated 7 years ago
Overview
- Description
- Atlassian JIRA 3.12 through 4.1 allows remote authenticated administrators to execute arbitrary code by modifying the (1) attachment (aka attachments), (2) index (aka indexing), or (3) backup path and then uploading a file, as exploited in the wild in April 2010.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:jira:3.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEA72E9E-ED89-4CD1-AF2F-3C2060E115FE" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67D2DF18-C072-47EF-9F99-3FBC3BD0B46A" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "618C3DD0-2AE2-4188-8BC2-69365594ADA0" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.12.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49E76A26-4A32-4D17-AE09-DAA99AAA49D7" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59835FFB-BB1C-4403-9CEC-DFC31F1A4D10" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.13.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAD7160D-BB0D-433A-8C7B-83BC311F53A8" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.13.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74F52C0A-6567-4466-A20C-9BC457E56592" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.13.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "547EF015-960F-43DB-8985-8BE65B14230A" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.13.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4931F747-FA7D-42BF-B71F-277EE38A29C5" }, { "criteria": "cpe:2.3:a:atlassian:jira:3.13.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "856597BE-1407-4587-B591-BD8B5B097B8A" }, { "criteria": "cpe:2.3:a:atlassian:jira:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6039B692-0E90-428E-B953-D1F21AC48575" }, { "criteria": "cpe:2.3:a:atlassian:jira:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEED2354-51E8-4BF0-A07E-C70E14A8D79A" }, { "criteria": "cpe:2.3:a:atlassian:jira:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86E22F6B-1CB8-4BAA-85EE-9B5FC4FD7635" }, { "criteria": "cpe:2.3:a:atlassian:jira:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B07F838-5D36-4CEB-9579-3AB8BD67CCB6" } ], "operator": "OR" } ] } ]