Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-8449

EPSS 71.08% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-8449

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Atlassian Jira 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Atlassian Jira是澳大利亚Atlassian公司的一套缺陷跟踪管理系统。该系统主要用于对工作中各类问题、缺陷进行跟踪管理。 Atlassian Jira 8.4.0之前版本中的/rest/api/latest/groupuserpicker资源存在访问控制错误漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
AtlassianJira unspecified ~ 8.4.0 -

II. Public POCs for CVE-2019-8449

#POC DescriptionSource LinkShenlong Link
1CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4https://github.com/mufeedvh/CVE-2019-8449POC Details
2User Enumeration Proof Of Concept Exploit for CVE-2019-8449https://github.com/r0lh/CVE-2019-8449POC Details
3Jira before 8.4.0 is susceptible to information disclosure. The /rest/api/latest/groupuserpicker resource can allow an attacker to enumerate usernames, and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized operations.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-8449.yamlPOC Details
4Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Jira%20groupuserpicker%20%E7%94%A8%E6%88%B7%E4%BF%A1%E6%81%AF%E6%9E%9A%E4%B8%BE%E6%BC%8F%E6%B4%9E%20CVE-2019-8449.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-8449

登录查看更多情报信息。

Same Patch Batch · Atlassian · 2019-09-11 · 7 CVEs total

CVE-2019-14995Atlassian Jira 安全漏洞
CVE-2019-14996Atlassian Jira 跨站脚本漏洞
CVE-2019-14997Atlassian Jira 安全漏洞
CVE-2019-14998Atlassian Jira 跨站请求伪造漏洞
CVE-2019-8450Atlassian Jira Optimization插件跨站脚本漏洞
CVE-2019-8451Atlassian Jira 代码问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2019-8449

No comments yet


Leave a comment