# ExploitTitle:AtlassianJiraServer/DataCenter8.16.0-ReflectedCross-SiteScripting(XSS)
# Date:06/05/2021
# ExploitAuthor:CAPTAIN_HOOK
# VendorHomepage: https://www.atlassian.com/
# SoftwareLink: https://www.atlassian.com/software/jira/download/data-center
# Version: versions <8.5.14,8.6.0 ≤ version <8.13.6,8.14.0 ≤ version <8.16.1
# Tested on:ANY
# CVE:CVE-2021-26078Description:The number range searcher component inJiraServer and JiraDataCenter before version 8.5.14, from version 8.6.0 before version 8.13.6, and from version 8.14.0 before version 8.16.1 allows remote attackers inject arbitrary HTML or JavaScript via across site scripting(XSS) vulnerability
*Fixed versions:*-8.5.14-8.13.6-8.16.1-8.17.0POC:-*Story points* custom field that exists by defaultin all JIRAServer has 3 types of Searchtemplate(None, number range searcher, number searcher)Bydefault the value of Search template is number range searcher OR number searcher.if the value of Search template was set on number range searcher the JIRA server is vulnerable to XSS attack by lowest privilege .ForTestingCheck the Story points custom field and it's details(for verifying that the Search template sets on number range searcher) with your ADMINaccount( just like the images) and in the other window Type this With your least privilege
user : jql=issuetype%20%3D%20Epic%20AND%20%22Story%20Points%22%20%3C%3D%20%22%5C%22%3E%3Cscript%3Ealert(document.cookie)%3C%2Fscript%3E%22%20AND%20%22Story%20Points%22%20%3E%3D%20%221%22YourXSSWill be triggered immediately.Reference:
https://jira.atlassian.com/browse/JRASERVER-72392?error=login_required&error_description=Login+required&state=9b05ec1f-587c-4014-9053-b6fdbb1efa21