Skip to content

Jira Unauthenticated Admin Projects

ID: jira-unauthenticated-adminprojects

Severity: info

Author: TESS

Tags: atlassian,jira

id: jira-unauthenticated-adminprojects
info:
name: Jira Unauthenticated Admin Projects
author: TESS
severity: info
classification:
cpe: cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: atlassian
product: jira
shodan-query: http.component:"Atlassian Jira"
tags: atlassian,jira
http:
- method: GET
path:
- "{{BaseURL}}/rest/menu/latest/admin"
matchers-condition: and
matchers:
- type: word
words:
- 'key'
- 'link'
- 'label'
- 'self'
condition: and
- type: status
status:
- 200
- type: word
part: header
words:
- "atlassian.xsrf.token"
# digest: 4b0a00483046022100b539c3d6cc75158b8c302413dfd2aa284de33babc7f3ed2de71038fe6aac9e0302210086cc22f5bba64368fb8f64e459698003561a05dd11cc21f92fb0530f1b58bfc9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/jira/jira-unauthenticated-adminprojects.yaml"

View on Github