[Bugcrowd] Bypass password protection to subscribe for a share
Description
A few steps were a bit unclear to me so I’ve added my notes to the original Bugcrowd report below.
Original report:
Steps to reproduce:
Part 1. Configuration
-
Log in to the victim's instance
-
Open any Jira issue
-
Click
...in the top right corner ->Create external share- this is the victim’s Share -
On the
Securitytab enableProtect link with password -
Copy the url of the share from the top - we just need the UUID, so make sure you are not accessing the page via the attacker ES account (which is needed in Part 2)
Part 2. The vulnerability
-
Log in to the victim's instance
-
Open any Jira issue
-
Click
...in the top right corner ->Create external share- this is the attacker’s Share -
Copy the url of the share from the top and open it
-
Click
My accountand log in via Atlassian, click to activate your account - this and the next step are relevant only if you’re not already logged on to the attacker account -
Open the attacker's share link again
-
In the top right corner expand the
Start watchingdropdown and clickInvite watchers -
Type the attacker's email (as in the Atlassian account), click
Inviteand intercept the request to/watchers/invitein Burp Suite -
Change the
shareUuidvalue in the request body to the victim's share uuid (you can get it from the share link that looks likehttps://jira.external-share.com/issue/<SHRE_UUID>) and process the request -
Go to the attacker's email and follow the link to accept the invite
-
After accepting the invite you will be redirected to
https://jira.external-share.com/dashboard.html?type=INVITATIONS, where you can see the issue title. Also, the issue changes will send notifications to the attacker's email as mentioned above
Receiving the e-mail is actually optional, you can just go to the attacker’s ES Dashboard → Invitations and see the watch invite there. Once accepted, make any changes to the shared Jira ticket and then you should get an e-mail with the updates.
Fix verified on ESFJ QA with Burp Suite against Mozilla Firefox (attacker). The invitation doesn’t go through and the attacker doesn’t receive the e-mail. Instead, an error pop-up presented below is displayed.
@Krzysztof Bogdan Sure
@Mariusz Szymański Can you take a look?