The EditApplinkServlet resource in the Atlassian Application Links plugin before version 5.4.20, from version 6.0.0 before version 6.0.12, from version 6.1.0 before version 6.1.2, from version 7.0.0 before version 7.0.1, and from version 7.1.0 before version 7.1.3 allows remote attackers who have obtained access to administrator's session to access the EditApplinkServlet resource without needing to re-authenticate to pass "WebSudo" in products that support "WebSudo" through an improper access control vulnerability.
Add notes...
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 6.4 => Medium severity
Exploitability Metrics
Attack Vector | Network |
---|---|
Attack Complexity | High |
Privileges Required | None |
User Interaction | Required |
Scope Metric
Scope | Unchanged |
---|
Impact Metrics
Confidentiality | Low |
---|---|
Integrity | High |
Availability | Low |
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L