Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 24th, 2019 📆 | 1943 Views ⚑

0

JIRA up to 7.13.2/8.0.3/8.1.0 /rest/api/2/user/picker information disclosure


iSpeech

CVSS Meta Temp Score Current Exploit Price (≈)
4.1 $0-$5k

A vulnerability was found in JIRA up to 7.13.2/8.0.3/8.1.0. It has been declared as problematic. Affected by this vulnerability is a code block of the file /rest/api/2/user/picker. The manipulation with an unknown input leads to a information disclosure vulnerability (Username). The CWE definition for the vulnerability is CWE-200. As an impact it is known to affect confidentiality.

The weakness was disclosed 05/22/2019. This vulnerability is known as CVE-2019-3403 since 12/19/2018. The attack can be launched remotely. Technical details of the vulnerability are known, but there is no available exploit.

Upgrading to version 7.13.3, 8.0.4 or 8.1.1 eliminates this vulnerability.

The entries 135365 and 135366 are pretty similar.

Name

VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 4.1

VulDB Base Score: ≈4.3
VulDB Temp Score: ≈4.1
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Information disclosure / Username (CWE-200)
Local: No
Remote: Yes

Availability: ?
Status: Not defined





Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?

Upgrade: JIRA 7.13.3/8.0.4/8.1.1

12/19/2018 CVE assigned
05/22/2019 +154 days Advisory disclosed
05/23/2019 +1 days VulDB entry created
05/23/2019 +0 days VulDB last updateCVE: CVE-2019-3403 (?)
See also: ?Created: 05/23/2019 12:19 PM
Complete: ?

Use the official API to access entries easily!

https://vuldb.com/?id.135367

Tagged with:



Comments are closed.