Lucene search

K
talosTalos IntelligenceTALOS-2019-0837
HistorySep 16, 2019 - 12:00 a.m.

Atlassian Jira issue attachment name information disclosure vulnerability

2019-09-1600:00:00
Talos Intelligence
www.talosintelligence.com
76

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

47.8%

Summary

An issue attachment name information disclosure vulnerability exists in Atlassian Jira, from versions 7.6.4 to 8.1.0. Anonymous users can differentiate between valid attachment names and invalid attachment names for any given issue via /rest/api/1.0/render API endpoint.

Tested Versions

Atlassian Jira 7.6.4 Atlassian Jira 8.1.0

Product URLs

<https://www.atlassian.com/software/jira&gt;

CVSSv3 Score

5.3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CWE

CWE-862 - Missing Authorization

Details

An attacker can use this vector to identify valid attachment names for any given issue. This does not require a valid session.

Exploit Proof-of-Concept

Submit a POST to /rest/api/1.0/render with the following body:

{"rendererType":"atlassian-wiki-renderer",
"unrenderedMarkup":"!&lt;ATTACHMENT-NAME&gt;!",
"issueKey":"&lt;ISSUE-KEY&gt;"}

replacing &lt;ISSUE-KEY&gt; with a valid issue key, and &lt;ATTACHMENT-NAME&gt; with a possibly valid attachment name.

A response containing โ€œUnable to render embedded objectโ€ฆโ€ indicates the filename is not valid for the issue.
A response containing โ€œUnable to embed resourceโ€ฆโ€ or a link to the file like โ€œโ€ฆ/secure/attachment/โ€ฆโ€ indicates the filename is valid.

Timeline

2019-05-14 - Vendor Disclosure
2019-09-09 - Vendor Patched
2019-09-16 - Public Release

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

47.8%