{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:00:12.136","vulnerabilities":[{"cve":{"id":"CVE-2021-43959","sourceIdentifier":"security@atlassian.com","published":"2022-07-26T08:15:07.177","lastModified":"2024-11-21T06:30:05.483","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Affected versions of Atlassian Jira Service Management Server and Data Center allow authenticated remote attackers to access the content of internal network resources via a Server-Side Request Forgery (SSRF) vulnerability in the CSV importing feature of JSM Insight. When running in an environment like Amazon EC2, this flaw may be used to access to a metadata resource that provides access credentials and other potentially confidential information. The affected versions are before version 4.13.20, from version 4.14.0 before 4.20.8, and from version 4.21.0 before 4.22.2."},{"lang":"es","value":"Las versiones afectadas de Atlassian Jira Service Management Server y Data Center permiten a atacantes remotos autenticados acceder al contenido de los recursos de la red interna por medio de una vulnerabilidad de tipo Server-Side Request Forgery (SSRF) en la funcionalidad CSV importing de JSM Insight. Cuando se ejecuta en un entorno como Amazon EC2, este fallo puede usarse para acceder a un recurso de metadatos que proporciona credenciales de acceso y otra información potencialmente confidencial. Las versiones afectadas son anteriores a 4.13.20, desde versión 4.14.0 hasta 4.20.8, y desde versión 4.21.0 hasta 4.22.2."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:R\/S:U\/C:H\/I:N\/A:N","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:data_center:*:*:*","versionEndExcluding":"4.13.20","matchCriteriaId":"AA928567-BF2C-4784-B408-56C4F91DA9A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:server:*:*:*","versionEndExcluding":"4.13.20","matchCriteriaId":"912BACE5-7B01-41B3-9980-BC810017A927"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*","versionStartIncluding":"4.14.0","versionEndExcluding":"4.20.8","matchCriteriaId":"A76AB67A-8F66-4C06-9624-A4DC1659F066"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*","versionStartIncluding":"4.14.0","versionEndExcluding":"4.20.8","matchCriteriaId":"48D484EA-9645-4775-8CBA-D9C7B363BF4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*","versionStartIncluding":"4.21.0","versionEndExcluding":"4.22.2","matchCriteriaId":"A924AC8A-8464-47C7-8B20-B4B607150C8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*","versionStartIncluding":"4.21.0","versionEndExcluding":"4.22.2","matchCriteriaId":"A138D6E0-2730-4B5D-B145-181F56C1B12C"}]}]}],"references":[{"url":"https:\/\/jira.atlassian.com\/browse\/JSDSERVER-11898","source":"security@atlassian.com","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https:\/\/jira.atlassian.com\/browse\/JSDSERVER-11898","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Vendor Advisory"]}]}}]}