Jira - Arbitrary File Read (CVE-2020-29453)
- Severity
- CVSSv3 Score
- 5.3
- Vulnerability description
Jira is affected by Pre-Authorization Arbitrary File Read vulnerability in the
/s/
endpoint. This allows attackers to read sensitive information from the target system by sending a specially crafted HTTP GET request to the vulnerable endpoint. The affected endpoints are/WEB-INF/classes/META-INF/maven/com.atlassian.jira/jira-core/pom.xml
and/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.xml"
.- Risk description
The risk exists that a remote unauthenticated attacker could exploit this vulnerability to read sensitive information from arbitrary files located on the file system of the server.
- Exploit capabilities
Sniper can read arbitrary files from the target system and extract them as evidence.
- Recommendation
Upgrade the Jira to the latest version.
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Feb 2021
- Published at
- Updated at
- Software Type
- Project management
- Vendor
- Atlassian
- Product
- Jira