Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on May 23rd, 2019 📆 | 4192 Views ⚑

0

JIRA up to 7.13.3/8.0.3/8.1.0 Access Check CachingResourceDownloadRewriteRule privilege escalation


iSpeech

CVSS Meta Temp Score Current Exploit Price (≈)
6.0 $0-$5k

A vulnerability was found in JIRA up to 7.13.3/8.0.3/8.1.0. It has been classified as critical. Affected is the function CachingResourceDownloadRewriteRule of the component Access Check. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was shared 05/22/2019. This vulnerability is traded as CVE-2019-8442 since 02/18/2019. It is possible to launch the attack remotely. There are known technical details, but no exploit is available.

Upgrading to version 7.13.4, 8.0.4 or 8.1.1 eliminates this vulnerability.

The issues 135385 are related to this entry.

Name

VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0

VulDB Base Score: ≈6.3
VulDB Temp Score: ≈6.0
VulDB Vector: ?
VulDB Reliability: ?

VulDB Base Score: ?
VulDB Temp Score: ?
VulDB Reliability: ?
Class: Privilege escalation (CWE-269)
Local: No
Remote: Yes

Availability: ?
Status: Not defined





Price Prediction: ?
Current Price Estimation: ?


0-Day unlock unlock unlock unlock
Today unlock unlock unlock unlock

Threat Intelligenceinfoedit

Threat: ?
Adversaries: ?
Geopolitics: ?
Economy: ?
Predictions: ?
Remediation: ?Recommended: Upgrade
Status: ?
0-Day Time: ?

Upgrade: JIRA 7.13.4/8.0.4/8.1.1

02/18/2019 CVE assigned
05/22/2019 +93 days Advisory disclosed
05/23/2019 +1 days VulDB entry created
05/23/2019 +0 days VulDB last updateCVE: CVE-2019-8442 (?)
See also: ?Created: 05/23/2019 12:36 PM
Complete: ?

Download it now for free!

https://vuldb.com/?id.135384

Tagged with:



Comments are closed.