HomePentest-Tools.com Logo

Jira - Arbitrary File Read (CVE-2020-29453)

Severity
CVSSv3 Score
5.3
Vulnerability description

Jira is affected by Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. This allows attackers to read sensitive information from the target system by sending a specially crafted HTTP GET request to the vulnerable endpoint. The affected endpoints are /WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml and /META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.xml".

Risk description

The risk exists that a remote unauthenticated attacker could exploit this vulnerability to read sensitive information from arbitrary files located on the file system of the server.

Exploit capabilities

Sniper can read arbitrary files from the target system and extract them as evidence.

Recommendation

Upgrade the Jira to the latest version.

Codename
Not available
Detectable with
Network Scanner
Exploitable with Sniper
Yes
Vuln date
Feb 2021
Published at
Updated at
Software Type
Project management
Vendor
Atlassian
Product
Jira