id: CVE-2019-3401
info:
name: Atlassian JIRA Information Exposure (CVE-2019-3401)
author: TechbrunchFR,milo2012
description: The ManageFilters.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
severity: medium
tags: cve,cve2019,jira,atlassian,exposure
reference: https://jira.atlassian.com/browse/JRASERVER-69244
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.30
cve-id: CVE-2019-3401
cwe-id: CWE-200
requests:
- method: GET
path:
- "{{BaseURL}}/secure/ManageFilters.jspa?filter=popular&filterView=popular"
matchers:
- type: word
words:
- '<span data-filter-field="owner-full-name">'
- '<title>Manage Filters - Jira</title>'
condition: and
# Remediation:
# Ensure that this permission is restricted to specific groups that require it.
# You can restrict it in Administration > System > Global Permissions.
# Turning the feature off will not affect existing filters and dashboards.
# If you change this setting, you will still need to update the existing filters and dashboards if they have already been
# shared publicly.
# Since Jira 7.2.10, a dark feature to disable site-wide anonymous access was introduced.