Rapid7 Vulnerability & Exploit Database

Atlassian JIRA: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2020-29453)

Back to Search

Atlassian JIRA: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CVE-2020-29453)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
02/22/2021
Created
04/09/2021
Added
04/08/2021
Modified
08/06/2021

Description

The CachingResourceDownloadRewriteRule class in Jira Server and Jira Data Center before version 8.5.11, from 8.6.0 before 8.13.3, and from 8.14.0 before 8.15.0 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

Solution(s)

  • atlassian-jira-upgrade-8_13_3
  • atlassian-jira-upgrade-8_15_0
  • atlassian-jira-upgrade-8_5_11

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;