CVE-2019-8442

HIGH EXPLOITED NUCLEI

Jira <7.13.4, <8.0.4, <8.1.1 - Path Traversal

Title source: llm

Description

The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check.

Nuclei Templates (1)

Jira - Local File Inclusion
HIGHby Kishore Krishna (siLLyDaddy)
Shodan: http.component:"Atlassian Jira" || http.component:"atlassian jira" || http.component:"atlassian confluence" || cpe:"cpe:2.3:a:atlassian:jira"

Scores

CVSS v3 7.5
EPSS 0.9314
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-11-17
Status published
Products (2)
atlassian/jira < 7.13.4
atlassian/jira_server 8.0.0 - 8.0.4
Published May 22, 2019
Tracked Since Feb 18, 2026