cve-2019-11581

Jira template injection
patch-1
ree4pwn 2020-12-05 16:51:54 +08:00 committed by GitHub
parent 99fc9ceff7
commit 3a7130030e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 31 additions and 0 deletions

31
cves/cve-2019-11581.yaml Normal file
View File

@ -0,0 +1,31 @@
id: cve-2019-11581
info:
name: Atlassian Jira template injection
description: There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
author: ree4pwn
severity:` critical
requests:
- method: GET
path:
- "{{BaseURL}}/secure/ContactAdministrators!default.jspa"
matchers:
- type: regex
regex:
- "\\(v4\\.4\\."
- "\\(v5\\."
- "\\(v6\\."
- "\\(v7\\.[012345789]\\."
- "\\(v7\\.1[0-2]\\."
- "\\(v7\\.6\\.([0-9]|[1][0-3])"
- "\\(v7\\.\\13\\.[0-4]"
- "\\(v8\\.0\\.[0-2]"
- "\\(v8\\.1\\.[0-1]"
- "\\(v8\\.2\\.[0-2]"
part: body
condition: or