Create CVE-2022-0540.yaml (#4309)

* Create CVE-2022-0288.yaml

* misc updates

* Create CVE-2022-0540.yaml

* Update CVE-2022-0540.yaml

* misc updates

Co-authored-by: sandeep <sandeep@projectdiscovery.io>
Co-authored-by: Prince Chaddha <prince@projectdiscovery.io>
patch-1
Dhiyaneshwaran 2022-05-06 15:19:17 +05:30 committed by GitHub
parent 7942179c21
commit 276060c66b
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 32 additions and 1 deletions

View File

@ -8,12 +8,12 @@ info:
remediation: Fixed in version 2.7.12 remediation: Fixed in version 2.7.12
reference: reference:
- https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42 - https://wpscan.com/vulnerability/27b64412-33a4-462c-bc45-f81697e4fe42
tags: cve,cve2022,wordpress,xss
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.10 cvss-score: 6.10
cve-id: CVE-2022-0288 cve-id: CVE-2022-0288
cwe-id: CWE-79 cwe-id: CWE-79
tags: cve,cve2022,wordpress,xss
requests: requests:
- method: POST - method: POST

View File

@ -0,0 +1,31 @@
id: CVE-2022-0540
info:
name: Atlassian Jira - Authentication bypass in Seraph
author: DhiyaneshDK
severity: high
description: |
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
reference:
- https://blog.viettelcybersecurity.com/cve-2022-0540-authentication-bypass-in-seraph/
- https://nvd.nist.gov/vuln/detail/CVE-2022-0540
- https://confluence.atlassian.com/display/JIRA/Jira+Security+Advisory+2022-04-20
metadata:
shodan-query: http.component:"Atlassian Jira"
tags: cve,cve2022,atlassian,jira,exposure,auth-bypass
requests:
- method: GET
path:
- '{{BaseURL}}/InsightPluginShowGeneralConfiguration.jspa;'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'General Insight Configuration'
- type: status
status:
- 200