nuclei-templates/http/cves/2019/CVE-2019-11581.yaml

58 lines
1.8 KiB
YAML

id: CVE-2019-11581
info:
name: Atlassian Jira Server-Side Template Injection
author: ree4pwn
severity: critical
description: Jira Server and Data Center is susceptible to a server-side template injection vulnerability via the ContactAdministrators and SendBulkMail actions. An attacker is able to remotely execute code on
systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before
8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
reference:
- https://github.com/jas502n/CVE-2019-11581
- https://jira.atlassian.com/browse/JRASERVER-69532
- https://nvd.nist.gov/vuln/detail/CVE-2019-11581
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2019-11581
cwe-id: CWE-74
metadata:
max-request: 1
shodan-query: http.component:"Atlassian Jira"
tags: cve,cve2019,atlassian,jira,ssti,rce,kev,cisa
http:
- method: GET
path:
- "{{BaseURL}}/secure/ContactAdministrators!default.jspa"
matchers-condition: and
matchers:
- type: regex
regex:
- "\\(v4\\.4\\."
- "\\(v5\\."
- "\\(v6\\."
- "\\(v7\\.[012345789]\\."
- "\\(v7\\.1[0-2]\\."
- "\\(v7\\.6\\.([0-9]|[1][0-3])"
- "\\(v7\\.\\13\\.[0-4]"
- "\\(v8\\.0\\.[0-2]"
- "\\(v8\\.1\\.[0-1]"
- "\\(v8\\.2\\.[0-2]"
condition: or
part: body
- type: word
words:
- "Contact Site Administrators"
part: body
- type: word
words:
- "has not yet configured this contact form"
part: body
negative: true
# Enhanced by mp on 2022/03/29