Loading HuntDB...

Sensitive data exposure via https://████████.mil/secure/QueryComponent!Default.jspa - CVE-2020-14179

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by r4d1kal

Vulnerability Details

Technical details and impact analysis

Information Disclosure
**Summary:** Information Disclosure vulnerability in outdated Jira. **Description:** Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. Additional details from [Atlassian][1] and related [CVE-2020-14179][2] Screenshot: ██████████ JSON output of exposed information: █████ ## Step-by-step Reproduction Instructions 1. Visit URL: https://█████████.mil/secure/QueryComponent!Default.jspa to view exposed information in any web browser. ## Product, Version, and Configuration (If applicable) The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1. Your currently instilled version is 8.11.0 which is displayed in page source - screenshot █████████ ## Suggested Mitigation/Remediation Actions Update affected Jira version according to vendor instructions. Thank you. [1]: https://jira.atlassian.com/browse/JRASERVER-71536 "JRASERVER-71536" [2]: https://nvd.nist.gov/vuln/detail/CVE-2020-14179 "CVE-2020-14179" ## Impact Unauthenticated attackers to view custom Jira field names and custom SLA names.

Related CVEs

Associated Common Vulnerabilities and Exposures

Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure