• Creation
  • Validation
  • Communication & fix
  • Disclosure

Jenkins.io / Jira vulnerable to CVE-2021-26086

BloodyShell reported 2021-10-12

The instance has been found vulnerable to CVE-2021-26086. And this allows remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. More info here: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26086

The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.

To fix this, you should update to the most recent version.

IP:
52.88.61.46
Port:
443
Detected protocol:
https
Found pom.properties through CVE-2021-26086:
#Generated by Maven
#Tue Mar 16 13:10:48 UTC 2021
version=8.13.5
groupId=com.atlassian.jira
artifactId=jira-webapp-dist
Found by JiraPlugin 2021-10-12
Report created by BloodyShell  2021-10-12
Report edited by BloodyShell  2021-10-12
Report approved by deleted-user  2021-10-12
New PDF report generated by system 2021-10-12
Report dispatched to ...@... by system 2021-10-12
system commented 2021-11-03: approved shows in report

bip! I'm a LeakIX probe.

This issue looks like it has been resolved!

New PDF report generated by system 2021-11-03
Report comment dispatched to BloodyShell by system 2021-11-03
Report comment dispatched to jenkinsci-cert@googlegroups.com by system 2021-11-03
Report marked as fixed by BloodyShell  2021-11-03
Report closed by BloodyShell  2021-11-03
New PDF report generated by system 2021-11-03
Report edited by BloodyShell  2021-11-03
New PDF report generated by system 2021-11-03
Information
Owner Jenkins.io
Created 2021-10-12 18:54
Updated 2021-11-03 18:46
Fixed true

Contacts
j...@googlegroups.com

Status
Status closed
Hosting contacted false
CERT contacted false

Download report