CVE‐2019‐8442 - carnal0wnage/J-PWN GitHub Wiki
CVE-2019-8442
Category: [Info Disclosure]
[CG] I haven't found any interesting info in any of these pom.xml files but YMMV
module name: check_cve_2019_8442
url:
/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml
/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.xml
/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.properties
INFO: Checking for CVE-2019-8442
- Checking URL: https://jiraserver/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml
- HTTP Status Code: 200
- Checking URL: https://jiraserver/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.xml
- HTTP Status Code: 200
- Checking URL: https://jiraserver/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.properties
- HTTP Status Code: 200
- NEEDS MANUAL REVIEW - No sensitive information detected at https://5.188.139.179/s/thiscanbeanythingyouwant/_/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.properties
References: https://jira.atlassian.com/browse/JRASERVER-69241
Description
The CachingResourceDownloadRewriteRule class in Jira
- before version 7.13.4
- and from version 8.0.0 before version 8.0.4
- and from version 8.1.0 before version 8.1.1
allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check.