Sensitive data exposure via https://███████/jira//secure/QueryComponent!Default.jspa - CVE-2020-14179
Medium
U
U.S. Dept Of Defense
Submitted None
Actions:
Reported by
lu3ky-13
Vulnerability Details
Technical details and impact analysis
Description:
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint.
## Impact
https://jira.atlassian.com/browse/JRASERVER-71536
https://hackerone.com/reports/1003980
## System Host(s)
████
## Affected Product(s) and Version(s)
## CVE Numbers
CVE-2020-14179
## Steps to Reproduce
Step-by-step Reproduction Instructions
URL:https://██████/jira//secure/QueryComponent!Default.jspa
## Suggested Mitigation/Remediation Actions
Related CVEs
Associated Common Vulnerabilities and Exposures
CVE-2020-14179
UNKNOWN
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Information Disclosure