Jira - Arbitrary File Read (CVE-2019-8442)
- Severity
- CVSSv3 Score
- 7.5
- Vulnerability description
Jira is affected by a Pre-Authorization Arbitrary File Read vulnerability in the
/s/
endpoint. This allows attackers to read sensitive information from the target system by sending a specially crafted HTTP GET request to the vulnerable endpoint. The affected endpoints are/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml
,/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.xml"
and/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.properties
.- Risk description
The risk exists that a remote unauthenticated attacker could exploit this vulnerability to read sensitive information from arbitrary files located on the file system of the server.
- Exploit capabilities
Sniper can read arbitrary files from the target system and extract them as evidence.
- Recommendation
Upgrade Jira to the latest version.
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Aug 2021
- Published at
- Updated at
- Software Type
- Project management
- Vendor
- Atlassian
- Product
- Jira