Loading HuntDB...

Changing Victim's JIRA Integration Settings Through Multiple Bugs

Medium
H
HackerOne
Submitted None
Reported by whhackersbr

Vulnerability Details

Technical details and impact analysis

Business Logic Errors
**Summary:** Changing victim's JIRA integration settings through multiple bugs. **Description:** Using multiple HackerOne bugs, an attacker can change the victim's JIRA integration settings. ### Bugs: ###1) The Jira integration consent screen lacks information about the Jira project that will be connected to HackerOne {F181926} ***Malicious or good Jira trying to connect above?*** Impossible to know without clicking on `Link JIRA Instance to program`, this is bad. ###2) JIRA project automatic selection When a user already have a JIRA connected to his HackerOne program, if an attacker sends a malicious link to him (with a malicious JIRA JWT token in it), clicking on `Link JIRA Instance to program` will change the JIRA account connected to the program and worst, it will automatically select the attacker's JIRA project without user interaction. Any new HackerOne report will be cloned to the attacker's JIRA project. ###3) Bypassing HackerOne link protection [Link protection bypass](https://hackerone.com/users/%2E/saml/[email protected]) ###4) HackerOne SAML Open Redirector ( #171398 ) ###5) Jira OAuth CSRF {F181925} {F181924} ### Conclusion: An attacker can use all bugs above in many ways to try to link his own JIRA project to the victim's HackerOne program. ### Optional: Supporting Material/References (Screenshots) * Video #1 (bugs #1 and #2 demonstration): ████████ * Video #2 (bug #5 demonstration): █████

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$1000.00

Submitted

Weakness

Business Logic Errors