2021-06-24 11:22:04 +00:00
id : CVE-2019-3401
2020-07-06 15:56:34 +00:00
info :
2021-06-24 11:22:04 +00:00
name : Atlassian JIRA Information Exposure (CVE-2019-3401)
author : TechbrunchFR,milo2012
2021-09-10 11:26:40 +00:00
severity : medium
2022-04-22 10:38:41 +00:00
description : The ManageFilters.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
reference :
- https://jira.atlassian.com/browse/JRASERVER-69244
2021-09-10 11:26:40 +00:00
classification :
2022-05-17 09:18:12 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 5.3
2021-09-10 11:26:40 +00:00
cve-id : CVE-2019-3401
2022-05-17 09:18:12 +00:00
cwe-id : CWE-863
2022-04-22 10:38:41 +00:00
tags : cve,cve2019,jira,atlassian,exposure
2020-07-06 15:58:12 +00:00
requests :
2020-07-06 15:56:34 +00:00
- method : GET
path :
- "{{BaseURL}}/secure/ManageFilters.jspa?filter=popular&filterView=popular"
matchers :
- type : word
words :
2021-06-24 11:22:04 +00:00
- '<span data-filter-field="owner-full-name">'
- '<title>Manage Filters - Jira</title>'
condition : and
2020-07-06 15:56:34 +00:00
# Remediation:
# Ensure that this permission is restricted to specific groups that require it.
# You can restrict it in Administration > System > Global Permissions.
# Turning the feature off will not affect existing filters and dashboards.
# If you change this setting, you will still need to update the existing filters and dashboards if they have already been
# shared publicly.
# Since Jira 7.2.10, a dark feature to disable site-wide anonymous access was introduced.