CVE-2015-5603
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
21/09/2015
Last modified:
12/04/2025
Description
The HipChat for JIRA plugin before 6.30.0 for Atlassian JIRA allows remote authenticated users to execute arbitrary Java code via unspecified vectors, related to "Velocity Template Injection Vulnerability."
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:atlassian:hipchat:*:*:*:*:*:*:*:* | 6.29.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/133401/Jira-HipChat-For-Jira-Java-Code-Execution.html
- http://www.rapid7.com/db/modules/exploit/multi/http/jira_hipchat_template
- http://www.securityfocus.com/archive/1/536374/100/0/threaded
- https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2015-08-26-776650785.html
- https://www.exploit-db.com/exploits/38551/
- https://www.exploit-db.com/exploits/38905/
- http://packetstormsecurity.com/files/133401/Jira-HipChat-For-Jira-Java-Code-Execution.html
- http://www.rapid7.com/db/modules/exploit/multi/http/jira_hipchat_template
- http://www.securityfocus.com/archive/1/536374/100/0/threaded
- https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2015-08-26-776650785.html
- https://www.exploit-db.com/exploits/38551/
- https://www.exploit-db.com/exploits/38905/



