Hi Team,
vulnerability | vulnerability.name | Affected File |
CVE-2024-47561 | Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code. | /home_9.12.10/atlassian-jira/WEB-INF/atlassian-bundled-plugins/analytics-client-8.2.17.jar -> META-INF/maven/org.apache.avro/avro |
CVE-2024-47561 | Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code. | /confluence/confluence/WEB-INF/atlassian-bundled-plugins/com.atlassian.analytics.analytics-client-8.3.5.jar -> META-INF/maven/org.apache.avro/avro |
We have the above Critical vulnerability in our environment due to Jira and Wiki.
Can you please confirm if upgrading them to the below versions will resolve the issue?
Wiki upgrade from 8.5.17 to 8.5.18
Jira Upgrade from 9.12.17 to 9.12.18
Hi @Sridhar R
> Can you please confirm if upgrading them to the below versions will resolve the issue?
Jira and Confluence arent impacted by this. Check the Security bulletin:
https://confluence.atlassian.com/security/security-bulletin-november-19-2024-1456179091.html
And this:
https://www.atlassian.com/trust/data-protection/vulnerabilities
Only Bamboo Data Center and Server are impacted.
Regards
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.