CVE-2012-2926
critical-risk
Published 2012-05-22
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
Do I need to act?
!
67.6% chance of exploitation in next 30 days
EPSS score — higher than 32% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (7)
Affected Vendors
References (20)
Broken Link
http://osvdb.org/81993
Not Applicable
http://secunia.com/advisories/49146
Third Party Advisory
http://www.securityfocus.com/bid/53595
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/75682
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697
Broken Link
http://osvdb.org/81993
Not Applicable
http://secunia.com/advisories/49146
Third Party Advisory
http://www.securityfocus.com/bid/53595
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/75682
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697
71
/ 100
critical-risk
Severity
31/34 · Critical
Exploitability
26/34 · High
Exposure
14/34 · Moderate