Loading HuntDB...

Plain text password for 'unknown' user exist in URL when opening jira.apiok.ru

Low
O
ok.ru
Submitted None
Reported by exadmin

Vulnerability Details

Technical details and impact analysis

Plaintext Storage of a Password
Documentation at https://api.mail.ru/docs/guides/billing/ has a link to http://apiok.ru/jira/documents/ which redirects to https://jira.apiok.ru/secure/CreateIssue.jspa?pid=-2&os_username=unknown&os_password=X7:1OEh3 This pair of username & password - is effective login & password to JIRA system and allows to create new tickets/save filters/upload attachments (which can be used to provide malicious content) I admit it can be incorrect realization of anonymouse tickets submission (which is possible at least since Fbe, 2016 https://confluence.atlassian.com/jirakb/how-to-allow-users-to-create-issues-anonymously-192551.html) ## Impact Plain password text can help to undestand pattern of password generation for other accounts Fishing is posible using official link to apiok.ru subdomain, i.e. http://jira.apiok.ru/secure/temporaryattachment/1585b6ba1084b134047a663dd8e698efc3a87e21/temp236609509878930861_test.png (and here can be png-bob for example which is accessible for everyone)

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Plaintext Storage of a Password