cve/2020/CVE-2020-29453.md

25 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-29453](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29453)
![](https://img.shields.io/static/v1?label=Product&message=Jira%20Data%20Center&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Jira%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%208.5.11%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Arbitrary%20File%20Read&color=brighgreen)
### Description
The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center before version 8.5.11, from 8.6.0 before 8.13.3, and from 8.14.0 before 8.15.0 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/UGF0aWVudF9aZXJv/Atlassian-Jira-pentesting
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/sushantdhopat/JIRA_testing