Security for everyone

CVE-2019-8449 Scanner

Detects 'User Enumeration' vulnerability in Atlassian Jira affects v. before 8.4.0.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one




Atlassian Jira is a popular project and issue tracking software used by teams across various industries to plan, track, and manage their work. It serves as a centralized hub for collaboration and productivity, allowing team members to stay updated on project progress, priorities, and deadlines. Whether it's software development, marketing campaigns, or HR processes, Jira provides customizable workflows, agile boards, and reports to help teams deliver high-quality results on time.

However, Jira's security was recently compromised with the detection of the CVE-2019-8449 vulnerability. This vulnerability can be found in the /rest/api/latest/groupuserpicker resource in Jira prior to version 8.4.0, allowing remote attackers to gain access to sensitive information. Specifically, the vulnerability enables attackers to enumerate usernames, thus making it easier to launch more targeted attacks.

The exploitation of the CVE-2019-8449 vulnerability can lead to serious consequences. Cybercriminals can use the information gathered to launch phishing attacks, social engineering attacks, and other forms of cyberattacks that can lead to data breaches, financial losses, and reputational damage. Since usernames are often used as a means of authentication, the exposure of this information can put user accounts and the entire infrastructure at risk.

Thanks to the pro features of the platform, you can easily and quickly learn about vulnerabilities in your digital assets. By subscribing, you will gain access to a wide range of proactive security measures, including threat intelligence, security alerts, and expert guidance. With, you can secure your digital assets and protect your organization from cybersecurity threats.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture