Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-29453Path Traversal in Atlassian Jira Data Center

CWE-22Path Traversal4 documents4 sources
Severity
5.3MEDIUMNVD
EPSS
86.9%
top 0.57%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 22
Latest updateMay 24

Description

The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center before version 8.5.11, from 8.6.0 before 8.13.3, and from 8.14.0 before 8.15.0 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages5 packages

CVEListV5atlassian/jira_data_centerunspecified8.5.11+4
NVDatlassian/jira_data_center8.14.08.15.0
CVEListV5atlassian/jira_serverunspecified8.5.11+4
NVDatlassian/jira_server8.5.108.5.11+2
NVDatlassian/data_center8.5.108.5.11+1

🔴Vulnerability Details

2
GHSA
GHSA-jg96-3p93-wmvr: The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center before version 82022-05-24
CVEList
CVE-2020-29453: The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center before version 82021-02-18

💥Exploits & PoCs

1
Nuclei
Jira Server Pre-Auth - Arbitrary File Retrieval (WEB-INF, META-INF)
CVE-2020-29453 — Path Traversal in Atlassian | cvebase