Sensitive data exposure via /secure/QueryComponent!Default.jspa endpoint - CVE-2020-14179

Pandiyan Muthuraman April 16, 2021

This is follow up of https://jira.atlassian.com/browse/JRASERVER-71536  which is not fixed properly

The work around provided for fixed versions isn't working. The issue still persists. 

Currently following work around provided for non-fixed version and its working, Looking forward dark feature support instead of change urlrewrite.xml file.

1 answer

0 votes
Gonchik Tsymzhitov
Community Leader
Community Leader
Community Leaders are connectors, ambassadors, and mentors. On the online community, they serve as thought leaders, product experts, and moderators.
April 16, 2021

Hm, check open Jira's right most of system still open 

https://jira.ncsa.illinois.edu//secure/QueryComponent!Default.jspa

 

But I would say sensitive data I did not find, because the same info I can find in other vectors like google dorks and  logs in different forums, code in github, bitbucket, gitee. 

Suggest an answer

Log in or Sign up to answer