nuclei-templates/cves/2019/CVE-2019-11581.yaml

47 lines
1.6 KiB
YAML
Raw Normal View History

id: CVE-2019-11581
2020-12-05 08:51:54 +00:00
info:
name: Atlassian Jira template injection
description: There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
author: ree4pwn
severity: critical
2020-12-06 09:32:10 +00:00
reference: https://github.com/jas502n/CVE-2019-11581
tags: cve,cve2019,atlassian,jira,ssti,rce
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.80
cve-id: CVE-2019-11581
cwe-id: CWE-74
2020-12-05 08:51:54 +00:00
requests:
- method: GET
2020-12-05 09:21:28 +00:00
path:
2020-12-05 08:51:54 +00:00
- "{{BaseURL}}/secure/ContactAdministrators!default.jspa"
2020-12-06 09:42:32 +00:00
matchers-condition: and
2020-12-05 08:51:54 +00:00
matchers:
- type: regex
regex:
- "\\(v4\\.4\\."
- "\\(v5\\."
- "\\(v6\\."
- "\\(v7\\.[012345789]\\."
- "\\(v7\\.1[0-2]\\."
- "\\(v7\\.6\\.([0-9]|[1][0-3])"
- "\\(v7\\.\\13\\.[0-4]"
- "\\(v8\\.0\\.[0-2]"
- "\\(v8\\.1\\.[0-1]"
- "\\(v8\\.2\\.[0-2]"
condition: or
2020-12-06 09:42:32 +00:00
part: body
- type: word
words:
- "Contact Site Administrators"
2021-02-24 13:26:43 +00:00
part: body
- type: word
words:
- "has not yet configured this contact form"
part: body
negative: true