-
Bug
-
Resolution: Fixed
-
Medium
-
11
-
Major
-
1
-
Issue Summary
Jira Cloud allows remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint.
Steps to Reproduce
- Access the Jira Cloud URL: https://hostname.atlassian.net/secure/QueryComponent!Default.jspa as anonymous user without logging in.
Expected Results
The endpoint should not expose custom field names etc.
Actual Results
It shows custom field names and custom SLA names.
Update
We have tested this issue in Jira Cloud and have found that the issue described in the ticket is not reproducible. If an unauthorised user tries to access the URL, the user can see default Jira fields - that are the same for any instance, not custom fields. Thus no sensitive information gets exposed & we have closed this ticket.
- relates to
-
JRASERVER-71536 Sensitive data exposure via /secure/QueryComponent!Default.jspa endpoint - CVE-2020-14179
-
- Closed
-
-
JRACLOUD-81340 Stop rendering data at /secure/QueryComponent!Default.jspa
- Gathering Interest