.. / CVE-2020-29453

Exploit for Jira Server Pre-Auth - Arbitrary File Retrieval (WEB-INF, META-INF) (CVE-2020-29453)

Description:

The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

Nuclei Template

View the template here CVE-2020-29453.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-29453.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://github.com/UGF0aWVudF9aZXJv/Atlassian-Jira-pentesting
https://github.com/ARPSyndicate/kenzer-templates
https://jira.atlassian.com/browse/JRASERVER-72014
https://nvd.nist.gov/vuln/detail/CVE-2020-29453