Atlassian Universal Plugin Manager up to 2.22.18/3.0.2/4.0.2 REST Endpoint cross site request forgery – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 25th, 2019 📆 | 5546 Views ⚑


Atlassian Universal Plugin Manager up to 2.22.18/3.0.2/4.0.2 REST Endpoint cross site request forgery

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability classified as problematic was found in Atlassian Universal Plugin Manager up to 2.22.18/3.0.2/4.0.2. This vulnerability affects some unknown functionality of the component REST Endpoint. The manipulation with an unknown input leads to a cross site request forgery vulnerability. The CWE definition for the vulnerability is CWE-352. As an impact it is known to affect integrity. An attacker might be able force legitimate users to initiate unwanted actions within the web application.

The weakness was released 08/23/2019. This vulnerability was named CVE-2019-14999 since 08/13/2019. The attack can be initiated remotely. The successful exploitation needs a single authentication. There are neither technical details nor an exploit publicly available.

Upgrading to version 2.22.19, 3.0.3 or 4.0.3 eliminates this vulnerability.



VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.1

VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Cross site request forgery (CWE-352)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: Universal Plugin Manager 2.22.19/3.0.3/4.0.3

08/13/2019 CVE assigned
08/23/2019 +10 days Advisory disclosed
08/24/2019 +1 days VulDB entry created
08/24/2019 +0 days VulDB last updateVendor:
CVE: CVE-2019-14999 (🔒)Created: 08/24/2019 10:55 AM
Complete: 🔍


No comments yet. Please log in to comment.

Upgrade your account now!

Tagged with:

Leave a Reply