38 lines
1.4 KiB
YAML
38 lines
1.4 KiB
YAML
id: CVE-2019-11581
|
|
|
|
info:
|
|
name: Atlassian Jira template injection
|
|
description: There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
|
|
author: ree4pwn
|
|
severity: critical
|
|
reference: https://github.com/jas502n/CVE-2019-11581
|
|
product: Jira
|
|
|
|
# This is detection template only, use the referenced link for the exploitation.
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/secure/ContactAdministrators!default.jspa"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
regex:
|
|
- "\\(v4\\.4\\."
|
|
- "\\(v5\\."
|
|
- "\\(v6\\."
|
|
- "\\(v7\\.[012345789]\\."
|
|
- "\\(v7\\.1[0-2]\\."
|
|
- "\\(v7\\.6\\.([0-9]|[1][0-3])"
|
|
- "\\(v7\\.\\13\\.[0-4]"
|
|
- "\\(v8\\.0\\.[0-2]"
|
|
- "\\(v8\\.1\\.[0-1]"
|
|
- "\\(v8\\.2\\.[0-2]"
|
|
condition: or
|
|
part: body
|
|
|
|
- type: word
|
|
words:
|
|
- "Contact Site Administrators"
|
|
part: body |