CVE-2019-20106
JIRA vulnerability analysis and mitigation

Overview

A broken access control vulnerability (CVE-2019-20106) was discovered in Atlassian Jira Server and Data Center. The vulnerability affects versions before 7.13.12, versions 8.0.0 to 8.5.4, and version 8.6.0 before 8.6.1. This security flaw was disclosed on February 5, 2020 (AttackerKB).

Technical details

The vulnerability allows remote attackers to make comments on tickets where they do not have commenting permissions due to a broken access control bug. The vulnerability has been assigned a CVSS v3.1 Base Score of 4.3 (Medium) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N. The attack vector is network-based, with low attack complexity, requiring low privileges and no user interaction (AttackerKB).

Impact

The vulnerability impacts the integrity of the affected systems by allowing unauthorized users to post comments on tickets they shouldn't have access to. The CVSS metrics indicate no impact on confidentiality or availability, with only a low impact on integrity (AttackerKB).

Mitigation and workarounds

Atlassian has released fixed versions to address this vulnerability. Users should upgrade to version 7.13.12 or later, 8.5.4 or later, or 8.6.1 or later depending on their current version track (Jira Issue).

Additional resources


SourceThis report was generated using AI

Related JIRA vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2022-1471CRITICAL9.8
  • IBM Db2IBM Db2
  • prometheus-jmx-exporter-openjdk11
NoYesDec 01, 2022
CVE-2025-22167HIGH8.7
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesOct 22, 2025
CVE-2025-22157HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesMay 20, 2025
CVE-2022-36799HIGH7.2
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesAug 01, 2022
CVE-2024-21685MEDIUM6.5
  • JIRAJIRA
  • cpe:2.3:a:atlassian:jira
NoYesJun 18, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management