https://github.com/h0ffayyy/Jira-CVE-2019-8451
POC to check for Jira instances vulnerable to CVE-2019-8451
https://github.com/h0ffayyy/Jira-CVE-2019-8451
Last synced: 4 months ago
JSON representation
POC to check for Jira instances vulnerable to CVE-2019-8451
- Host: GitHub
- URL: https://github.com/h0ffayyy/Jira-CVE-2019-8451
- Owner: h0ffayyy
- License: mit
- Created: 2019-09-28T01:01:26.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2019-09-28T03:13:25.000Z (about 6 years ago)
- Last Synced: 2024-11-21T14:38:09.149Z (12 months ago)
- Language: Python
- Size: 2.93 KB
- Stars: 6
- Watchers: 1
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - h0ffayyy/Jira-CVE-2019-8451 - POC to check for Jira instances vulnerable to CVE-2019-8451 (Python)
README
# Jira CVE-2019-8451 POC
## Description
Proof of concept scan to check if a Jira host is vulnerable to CVE-2019-8451
### CVE-2019-8451
CVE-2019-8451 is a pre-authentication server side request forgery (SSRF) vulnerability found in the /plugins/servlet/gadgets/makeRequest resource.
This vulnerability was introduced in Jira server version 7.6.0, and fixed in versions 7.13.9 and 8.4.0.
## Requirements
Only needs the requests library.
Install with `pip3 install requests`
## Usage
```
$ ./jira-2019-8451.py -h
usage: jira-2019-8451.py [-h] [-u URL] [-c]
For checking if a Jira instance is vunlerable to CVE-2019-8451
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL URL of the target Jira instance e.g. '-u
https://localhost:8080'
-c, --check Only check the Jira version; doesn't send SSRF attempt
```
## Example Output
Host probably vulnerable:
```
$ python3 jira.py -u https://localhost:8080
[-] Testing https://localhost:8080...
[-] Checking for version...
[-] Jira version appears to be: 8.3.4
[-] Sending SSRF test...
[+] Host appears to be vulnerable!
```
Host probably not vulnerable:
```
$ python3 jira.py -u https://localhost:8080
[-] Testing https://localhost:8080...
[-] Checking for version...
[-] Jira version appears to be: 8.4.1
[-] Sending SSRF test...
[!] Host doesn't appear to be vulnerable.
```
## References
- https://www.tenable.com/blog/cve-2019-8451-proof-of-concept-available-for-server-side-request-forgery-ssrf-vulnerability-in
- https://jira.atlassian.com/browse/JRASERVER-69793