From adf29bfe588b682d1262bdc4860ebc13f23fe12d Mon Sep 17 00:00:00 2001
From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com>
Date: Wed, 26 Oct 2022 11:54:30 +0530
Subject: [PATCH] Fix FP CVE-2019-3402
---
cves/2019/CVE-2019-3402.yaml | 20 ++++++++++++++------
1 file changed, 14 insertions(+), 6 deletions(-)
diff --git a/cves/2019/CVE-2019-3402.yaml b/cves/2019/CVE-2019-3402.yaml
index 9624e09c44..e35c785a95 100644
--- a/cves/2019/CVE-2019-3402.yaml
+++ b/cves/2019/CVE-2019-3402.yaml
@@ -1,10 +1,11 @@
id: CVE-2019-3402
info:
- name: Jira <8.1.1 - Cross-Site Scripting
+ name: Jira < 8.1.1 - Cross-Site Scripting
author: pdteam
severity: medium
- description: Jira before 8.1.1 contains a cross-site scripting vulnerability via ConfigurePortalPages.jspa resource in the searchOwnerUserName parameter.
+ description: |
+ Jira before 8.1.1 contains a cross-site scripting vulnerability via ConfigurePortalPages.jspa resource in the searchOwnerUserName parameter.
reference:
- https://gist.github.com/0x240x23elu/891371d46a1e270c7bdded0469d8e09c
- https://jira.atlassian.com/browse/JRASERVER-69243
@@ -15,6 +16,7 @@ info:
cve-id: CVE-2019-3402
cwe-id: CWE-79
metadata:
+ verified: true
shodan-query: http.component:"Atlassian Jira"
tags: cve,cve2019,atlassian,jira,xss
@@ -25,12 +27,18 @@ requests:
matchers-condition: and
matchers:
+ - type: word
+ part: body
+ words:
+ - "'' does not exist"
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
- type: status
status:
- 200
- - type: word
- words:
- - ""
- part: body
# Enhanced by mp on 2022/08/31