Overview
- Description
- The admin backupprogress action in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allows remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the filename of a backup.
- Source
- security@atlassian.com
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 4.8
- Impact score
- 2.7
- Exploitability score
- 1.7
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97718354-9B00-4E93-A879-7423456E0344", "versionEndExcluding": "4.4.3", "versionStartIncluding": "4.4.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1A5C301-8708-4774-9DC5-717E88A805F0", "versionEndExcluding": "4.4.3", "versionStartIncluding": "4.4.0" } ], "operator": "OR" } ] } ]