Jira - Arbitrary File Read (CVE-2021-26086)
- Severity
- CVSSv3 Score
- 5.3
- Vulnerability description
Jira is affected by a Pre-Authorization Arbitrary File Read vulnerability in the
/s/
endpoint. This allows attackers to read sensitive information from the target system by sending a specially crafted HTTP GET request to the vulnerable endpoint. The affected endpoints are/WEB-INF/web.xml
,/WEB-INF/decorators.xml
,/WEB-INF/classes/seraph-config.xml
,META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.properties
andMETA-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.xml
andMETA-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml
.- Risk description
The risk exists that a remote unauthenticated attacker could exploit this vulnerability to read sensitive information from arbitrary files located on the file system of the server.
- Exploit capabilities
Sniper can read arbitrary files from the target system and extract them as evidence.
- Recommendation
Upgrade Jira to the latest version.
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Aug 2021
- Published at
- Updated at
- Software Type
- Project management
- Vendor
- Atlassian
- Product
- Jira