The WebWork 1 web application framework in Atlassian JIRA before 3.13.2 allows remote attackers to invoke exposed public JIRA methods via a crafted URL that is dynamically transformed into method calls, aka "WebWork 1 Parameter Injection Hole."
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://secunia.com/advisories/33084 | third party advisory vendor advisory |
http://www.osvdb.org/52707 | vdb entry broken link |
http://www.securityfocus.com/bid/32746 | third party advisory vdb entry |
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2008-12-09 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47211 | vdb entry |