nuclei-templates/http/vulnerabilities/jira/jira-unauthenticated-dashbo...

38 lines
1.4 KiB
YAML

id: jira-unauthenticated-dashboards
# If public sharing is ON it allows users to share dashboards and filters with all users including
# those that are not logged in. Those dashboards and filters could reveal potentially sensitive information.
info:
name: Jira Unauthenticated Dashboards
author: TechbrunchFR
severity: info
classification:
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: atlassian
product: jira
shodan-query: http.component:"Atlassian Jira"
tags: atlassian,jira
http:
- method: GET
path:
- "{{BaseURL}}/rest/api/2/dashboard?maxResults=100"
matchers:
- type: word
words:
- 'dashboards'
- 'startAt'
- 'maxResults'
condition: and
# Remediation:
# Ensure that this permission is restricted to specific groups that require it.
# You can restrict it in Administration > System > Global Permissions.
# Turning the feature off will not affect existing filters and dashboards.
# If you change this setting, you will still need to update the existing filters and dashboards if they have already been
# shared publicly.
# Since Jira 7.2.10, a dark feature to disable site-wide anonymous access was introduced.
# digest: 490a004630440220279ab7bdc86d2936e42c190eeea7e5ba813ad781c7e782f91a4b1180d4e7737e02200182405c2d6e3c5372981e276cb04cf5f55ff341cf1f6317d911a897a816c2e2:922c64590222798bb761d5b6d8e72950