Jira Server/Data Center Limited Remote File Read (CVE-2021-26086)

medium Nessus Plugin ID 187096

Synopsis

The remote JIRA application is affected by a path traversal vulnerability.

Description

The Atlassian JIRA application running on the remote host is < 8.5.14, 8.6.0 < 8.13.6 or 8.14.0 < 8.16.1.
It is ,therefore, affected by a path traversal vulnerability affecting the /WEB-INF/web.xml endpoint. Attackers can exploit this vulnerability to read particular files.

Solution

Upgrade Jira Server/Data Center to 8.5.14, 8.13.6, 8.16.1, 8.17.0 later.

See Also

https://jira.atlassian.com/browse/JRASERVER-72695

Plugin Details

Severity: Medium

ID: 187096

File Name: jira_cve-2021-26086.nbin

Version: 1.20

Type: remote

Family: Web Servers

Published: 12/19/2023

Updated: 11/22/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-26086

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:jira

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 8/21/2021

Vulnerability Publication Date: 8/21/2021

CISA Known Exploited Vulnerability Due Dates: 12/3/2024

Reference Information

CVE: CVE-2021-26086