JIRA Directory Traversal Vulnerability CVE-2019-8442 Scanner

Details
Stay Up To Date
Asset Type

DOMAIN,IP

Need Membership

Yes

Asset Verify

Yes

API Support

Yes

Estimate Time (Second)

15

JIRA Directory Traversal Vulnerability CVE-2019-8442 Scanner Detail

There is a directory traversal vulnerability in the JIRA, which allow remote attackers to read arbitrary files.

The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check.

Some Advice for Common Problems

Update your Jira application to the latest version to eliminate this vulnerability.

Community Discussions

Need a Full Assesment?

Get help from professional hackers. Learn about our penetration test service now!

Request Pentest Service