Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.WEB_APPLICATION_SCANNING_113782
HistoryMar 14, 2023 - 12:00 a.m.

Atlassian Jira 8.0.0 < 8.0.4 Multiple Vulnerabilities

2023-03-1400:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
11
atlassian jira
version 7.13.0
version 7.13.4
version 8.1.1
remote attackers
administrator's session
viewupgrades
improper access control
cve-2019-8443
files access
meta-inf directory
cachingresourcedownloadrewriterule
cve-2019-8442
user enumeration
/rest/api/2/user/picker
authorization check
cve-2019-3403
scanner

EPSS

0.971

Percentile

99.8%

According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is version 7.13.0 prior to 7.13.4, 8.0.0 prior to 8.0.4 or 8.1.0 prior to 8.1.1. It is, therefore, affected by multiple vulnerabilities:

  • A vulnerability which permits remote attackers who have obtained access to administrator’s session to access the ViewUpgrades administrative resource without needing to re-authenticate via a improper access control flaw (CVE-2019-8443).

  • A vulnerability which permits remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check in the CachingResourceDownloadRewriteRule class (CVE-2019-8442).

  • A vulnerability in the /rest/api/2/user/picker rest resource which permits allows remote attackers to enumerate usernames via an incorrect authorisation check(CVE-2019-3403).

Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.

No source data

EPSS

0.971

Percentile

99.8%