Atlassian Tempo 6.4.3 / JIRA 5.0.0 / Gliffy 3.7.0 - XML Parsing Denial of Service
CVE编号
CVE-2012-2926利用情况
暂无补丁情况
N/A披露时间
2012-05-23漏洞描述
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | atlassian | bamboo | * | Up to (excluding) 3.3.4 | |||||
运行在以下环境 | |||||||||
应用 | atlassian | bamboo | * | From (including) 3.4 | Up to (excluding) 3.4.5 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | confluence | * | Up to (excluding) 3.5.16 | |||||
运行在以下环境 | |||||||||
应用 | atlassian | confluence | * | From (including) 4.0 | Up to (excluding) 4.0.7 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | confluence | * | From (including) 4.1 | Up to (excluding) 4.1.10 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | crowd | * | Up to (excluding) 2.0.9 | |||||
运行在以下环境 | |||||||||
应用 | atlassian | crowd | * | From (including) 2.1 | Up to (excluding) 2.1.2 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | crowd | * | From (including) 2.2.0 | Up to (excluding) 2.2.9 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | crowd | * | From (including) 2.3.0 | Up to (excluding) 2.3.7 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | crowd | * | From (including) 2.4.0 | Up to (excluding) 2.4.1 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | crucible | * | Up to (excluding) 2.5.8 | |||||
运行在以下环境 | |||||||||
应用 | atlassian | crucible | * | From (including) 2.6 | Up to (excluding) 2.6.8 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | crucible | * | From (including) 2.7 | Up to (excluding) 2.7.12 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | fisheye | * | Up to (excluding) 2.5.8 | |||||
运行在以下环境 | |||||||||
应用 | atlassian | fisheye | * | From (including) 2.6 | Up to (excluding) 2.6.8 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | fisheye | * | From (including) 2.7 | Up to (excluding) 2.7.12 | ||||
运行在以下环境 | |||||||||
应用 | atlassian | jira | * | Up to (excluding) 5.0.1 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 无
CWE-ID | 漏洞类型 |
NVD-CWE-noinfo |
Exp相关链接
- avd.aliyun.com
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论