updated workflow

patch-1
sandeep 2021-05-03 15:37:05 +05:30
parent b2ffaa1c5b
commit a3c73e6aa3
2 changed files with 5 additions and 5 deletions

View File

@ -2,9 +2,10 @@ id: CVE-2019-8446
info: info:
name: Jira Improper Authorization name: Jira Improper Authorization
description: The /rest/issueNav/1/issueTable resource in Jira before version 8.3.2 allows remote attackers to enumerate usernames via an incorrect authorisation check.
author: dhiyaneshDk author: dhiyaneshDk
severity: medium severity: medium
tags: jira,cve2019 tags: cve,cve2019,jira
requests: requests:
- raw: - raw:
@ -18,7 +19,8 @@ requests:
Accept-Encoding: gzip, deflate Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9 Accept-Language: en-US,en;q=0.9
{'jql':'project in projectsLeadByUser("g147isalive")'} {'jql':'project in projectsLeadByUser("{{randstr}}")'}
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: word - type: word

View File

@ -6,9 +6,6 @@ info:
description: A simple workflow that runs all Jira related nuclei templates on a given target. description: A simple workflow that runs all Jira related nuclei templates on a given target.
tags: workflow tags: workflow
# Supported on Nuclei v2.2.0 (https://github.com/projectdiscovery/nuclei/releases/tag/v2.2.0)
# Old workflows still remains valid, and will be working with all nuclei versions.
workflows: workflows:
- template: exposed-panels/jira-detect.yaml - template: exposed-panels/jira-detect.yaml
@ -19,6 +16,7 @@ workflows:
- template: cves/2019/CVE-2019-3396.yaml - template: cves/2019/CVE-2019-3396.yaml
- template: cves/2019/CVE-2019-3402.yaml - template: cves/2019/CVE-2019-3402.yaml
- template: cves/2019/CVE-2019-8442.yaml - template: cves/2019/CVE-2019-8442.yaml
- template: cves/2019/CVE-2019-8446.yaml
- template: cves/2019/CVE-2019-8449.yaml - template: cves/2019/CVE-2019-8449.yaml
- template: cves/2019/CVE-2019-8451.yaml - template: cves/2019/CVE-2019-8451.yaml
- template: cves/2019/CVE-2019-11581.yaml - template: cves/2019/CVE-2019-11581.yaml