5
CVSSv2

CVE-2020-14181

Published: 17/09/2020 Updated: 25/03/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint. The affected versions are before version 7.13.6, from version 8.0.0 prior to 8.5.7, and from version 8.6.0 prior to 8.12.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian data center

atlassian jira

atlassian jira server

Exploits

Atlassian JIRA version 8111 suffers from a user enumeration vulnerability ...

Github Repositories

Poc for CVE-2020-14181

CVE-2020-14181 Poc for CVE-2020-14181 Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHoverjspa endpoint This vulnerability was discovered by Mikhail Klyuchnikov of Positive Technologies POC For CVE-2020-1481 - Jira Username Enumerator/Validator Usage: pyth

POC For CVE-2020-1481 - Jira Username Enumerator/Validator

CVE-2020-14181 Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHoverjspa endpoint This vulnerability was discovered by Mikhail Klyuchnikov of Positive Technologies Affected versions: version < 71316 800 ≤ version < 857 860 ≤ ver

一款用于快速验证漏洞的简易框架

R-poc 一款用于快速验证漏洞的简易框架 基于Airpoc,对其进行了改动 原项目文章:paperseebugorg/913/ 支持单/多目标,多目标写在文件列表内 暴力执行pocs目录下的所有poc对目标进行测试 可检测列表 Struts2系列 st2-045 st2-046 unauth redis-unauthpy mongodb-unauthpy zookeeper-unauthpy jenkins-u

Recent Articles

First, Patch Tuesday. Now, Oh Hell, Monday: Microsoft emits bonus fixes for Visual Studio, Windows 10 security bugs
The Register • Iain Thomson in San Francisco • 19 Oct 2020

Plus: A warning to SharePoint operators

In brief Just days after issuing fixes for scores of bugs in its products for this month's Patch Tuesday, Microsoft has issued two more patches for security holes that can be exploited by maliciously crafted files to run malware on victims' computers. The first, CVE-2020-17023, is a Visual Studio issue that allows for remote code execution after getting the target to click on a specially crafted package.json file. As for the second, CVE-2020-17022, that's a memory-handling bug in the Windows 10 ...