CVE Vulnerabilities

CVE-2021-39112

Use of Web Link to Untrusted Target with window.opener Access

Published: Aug 25, 2021 | Modified: Nov 21, 2024
CVSS 3.x
4.8
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
CVSS 2.x
4.9 MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1.

Weakness

The web application produces links to untrusted external sites outside of its sphere of control, but it does not properly prevent the external site from modifying security-critical properties of the window.opener object, such as the location property.

Affected Software

Name Vendor Start Version End Version
Data_center Atlassian * 8.5.15 (excluding)
Jira Atlassian * 8.5.15 (excluding)
Jira_data_center Atlassian 8.6.0 (including) 8.13.7 (excluding)
Jira_data_center Atlassian 8.14.0 (including) 8.17.1 (excluding)
Jira_data_center Atlassian 8.18.0 (including) 8.18.1 (excluding)
Jira_server Atlassian 8.6.0 (including) 8.13.7 (excluding)
Jira_server Atlassian 8.14.0 (including) 8.17.1 (excluding)
Jira_server Atlassian 8.18.0 (including) 8.18.1 (excluding)

Potential Mitigations

  • When creating a link to an external document using the tag with a defined target, for example “_blank” or a named frame, provide the rel attribute with a value “noopener noreferrer”.
  • If opening the external document in a new window via javascript, then reset the opener by setting it equal to null.
  • Do not use “_blank” targets. However, this can affect the usability of the application.

References