nuclei-templates/http/vulnerabilities/jira/jira-unauthenticated-dashbo...

39 lines
1.4 KiB
YAML

id: jira-unauthenticated-dashboards
# If public sharing is ON it allows users to share dashboards and filters with all users including
# those that are not logged in. Those dashboards and filters could reveal potentially sensitive information.
info:
name: Jira Unauthenticated Dashboards
author: TechbrunchFR
severity: info
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
product: jira
vendor: atlassian
tags: atlassian,jira
classification:
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
http:
- method: GET
path:
- "{{BaseURL}}/rest/api/2/dashboard?maxResults=100"
matchers:
- type: word
words:
- 'dashboards'
- 'startAt'
- 'maxResults'
condition: and
# Remediation:
# Ensure that this permission is restricted to specific groups that require it.
# You can restrict it in Administration > System > Global Permissions.
# Turning the feature off will not affect existing filters and dashboards.
# If you change this setting, you will still need to update the existing filters and dashboards if they have already been
# shared publicly.
# Since Jira 7.2.10, a dark feature to disable site-wide anonymous access was introduced.
# digest: 4a0a0047304502210082b7cb53987cdc653c9a8954733b3456da26355e585b238aa94d81e7938d77f302204de8001df94c11cc650f5ae455212a63c404a066cc29b911fd45686c3bde1a9e:922c64590222798bb761d5b6d8e72950