Path Traversal CVE-2021-26086 CVE-2021-26085
Medium
M
MariaDB
Submitted None
Actions:
Reported by
kljunowsky
Vulnerability Details
Technical details and impact analysis
These vulnerabilities were found with https://trickest.com https://trickest.io
CVE-2021-26085:
=====================
>https://jira.mariadb.org:/s/123cfx/_/;/WEB-INF/web.xml
CVE-2021-26086:
=====================
>https://jira.mariadb.org/s/cfx/_/;/WEB-INF/web.xml
Video explanation:
---------------------
### Node EOF-RAW-blocked:
- Found Jira hosts from various bug bounty programs convert to file
### Node SED-ADD-AT-BEGINNING:
- Append https:// to every line
### Node PASTE-JIRA-PATHS
- Converts Jira paths to file
### Node MEG(tool)
- Requesting URLs and paths from the file
### Node IS-IT-JIRA?
- Checking if the requested URL is Jira
### Node TAKE-JIRA-URLs
- Parsing previous nodes to get raw URLs
### Node CVE-2021-26086
- Converts payloads to a file
### Node CVE-2021-26085
- Converts payloads to a file
### Node RECURSIVELY-CAT-ALL
- Converts payloads file into one
### Node MEG (2)
- Requesting URLs and paths from the file
### Node VALIDATE CVE-2021-26086
- Validates CVEs by searching for "<web-app </web-app>" in meg responses
## Impact
CVE-2021-26086 allows remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint
CVE-2021-26085 allows remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint.
Related CVEs
Associated Common Vulnerabilities and Exposures
CVE-2021-26086
UNKNOWN
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
CVE-2021-26085
UNKNOWN
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Path Traversal