CVE-2022-0540
Published Apr 20, 2022
Last updated 22 days ago
Overview
- Description
- A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
- Source
- security@atlassian.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-287
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E697C406-32A4-47B8-A5D7-5368EA7A871C", "versionEndExcluding": "8.13.8" }, { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FCC4AF6-596D-4476-AEF3-23217B060A25", "versionEndExcluding": "8.20.6", "versionStartIncluding": "8.14.0" }, { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FB66C54-EF31-4E7C-8E17-32A108FEC911", "versionEndExcluding": "8.22.0", "versionStartIncluding": "8.21.0" }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEDC4C09-8764-41F0-8757-FDED8C8FA0EF", "versionEndExcluding": "8.13.8" }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56F298E4-0956-4560-880D-47BA97D1D2EA", "versionEndExcluding": "8.20.6", "versionStartIncluding": "8.14.0" }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4016C4DC-25F7-4F15-84CF-19547F5B9720", "versionEndExcluding": "8.22.0", "versionStartIncluding": "8.21.0" }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*", "vulnerable": true, "matchCriteriaId": "135F2D8C-19FD-4A8C-A3C1-6A940EEED5BE", "versionEndExcluding": "4.13.8" }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D099EC-2EC5-4A83-85F4-F61371821CC5", "versionEndExcluding": "4.13.18" }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*", "vulnerable": true, "matchCriteriaId": "97EB58EA-E57A-4AFE-8627-F772A252A60B", "versionEndExcluding": "4.20.6", "versionStartIncluding": "4.14.0" }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*", "vulnerable": true, "matchCriteriaId": "ED2F696D-6C18-418F-BFB8-721BD3762653", "versionEndExcluding": "4.20.6", "versionStartIncluding": "4.14.0" }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*", "vulnerable": true, "matchCriteriaId": "E75D38BE-2949-444B-A203-D136F48D1DBA", "versionEndExcluding": "4.22.0", "versionStartIncluding": "4.21.0" }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*", "vulnerable": true, "matchCriteriaId": "24A229DD-9707-42E8-97A7-91EE23970DE4", "versionEndExcluding": "4.22.0", "versionStartIncluding": "4.21.0" } ], "operator": "OR" } ] } ]