Some months back, I published an article on Exposed JIRA server leaks NASA staff and project data in which I was able to find NASA staff details, their username, their email ids along with their internal project details which were getting leaked by one of their tools JIRA which is an Atlassian task tracking systems/project management software used by around 135,000 companies and organization globally. The root cause behind the leak was the wild misconfiguration which was present in JIRA. Why the term wild being used is because, with the help of the same misconfiguration, I happened to access internal user data, internal project details of hundreds and thousands of companies which were using JIRA.

Lots of companies were from Alexa and Fortune top lists as well. The affected customers ranges from companies as big as NASA, Google, Yahoo to Go-Jek, HipChat, Zendesk, Sapient, Dubsmash,Western union, Lenovo, 1password,Informatica, etc and many sectors of various government around the world also suffered the same privacy issue like one of the portal of European government, United Nations, NASA, Brazilian government transport portal, Canadain governement finance portal.

where due to some misconfiguration issues in JIRA, their internal user data, their name, email ids, their project details on which they were working, assignee of those projects and various other information were getting exposed.

Here, Ill be sharing about what was that critical vulnerability that I happened to find in Jira (An Atlassian task tracking systems/project management software) or more specifically a misconfiguration issue which caused the leakage of internal sensitive information of organization and companies. Lets see what was the exact issue

In Jira, while creating filters or dashboards it provides some visibility option to apply to them. The issue was due to the wrong permissions assigned to them. When the filters and dashboards for the projects/issues are created in JIRA, then by default the visibility is set to All users and Everyone respectively, which instead of sharing with everyone of the organizations (which people think and interpret), it share them publically. There is also a user picker functionality in Jira which gives a complete list of every users username and email address. This information disclosure is the result of an authorization misconfiguration in Jiras Global Permissions settings. Because of the wrong permissions scheme, the following internal information appeared to be vulnerable:

Anyone with the link can access them from anywhere and get hold of various sensitive information and because they are being indexed by all the search engines so anyone can easily find them with some simple search queries.

NASA Staff data because of misconfigured Jira user picker functionality

NASA Project details getting exposed due to public Filter and dashboard

As can be seen above, it discloses employees names, employee roles, upcoming milestones, secret project, and various other features due to these misconfigured Jira settings.

Now, how I found the links/URLs of these publically exposed user picker functionality, filters, and dashboards of so many companies and the help came from Google dorks (search query). To search for the companies having user picker functionality in Jira as misconfigured and so the complete list of their staff username and email address exposed, here is the search query

This query list all the URLs having UserPickerBrowser in their URI to find all the misconfigured Jira User picker functionality which are publically exposed and also notauthenticated.

While for filters and dashboards, we can see the URLs of these filters and dashboards containing Managefilters and ConfigurePortal as a part. I went on to create the search query

This query list all the URLs having Managefilters in their URI and having text as Public so to find all the misconfigured JIRA filters which are publically exposed and also notauthenticated.

This query list all the URLs having ConfigurePortalPages in their URI to find all the JIRA dashboard which are publically exposed.

On further recon(information gathering), I have found that various companies have JIRA URL in the format so if you want to check for any company who have misconfigured filter, dashboard or user picker functionality, you need to just put their name in the URL like

Thousands of companies filters, dashboards and staff data were publically exposed.It occurs because of the wrong permissions scheme set to filters and dashboards hence providing their access even to non-logged in users and hence leading to leaking of sensitive data. I have discovered several such misconfigured JIRA accounts in hundreds of companies.Some of the companies were from Alexa and Fortune top list including big giants like NASA, Google, Yahoo, etc and government sites as well like

The Brazilian government has Jira filter misconfigured of their Road and Transport system hence exposing some of their project details, employee names, etc which was fixed after reaching out to them.

Similarly, the United Nations accidentally made their Jira filters and Jira dashboard public hence exposed their internal project details, secrets milestones, etc which was fixed by them after I reported it and was rewarded by them in theirHall of famelist.

Even the European government suffered the same exposure when theirCommercial finance software systems and solutionshad the same Jira misconfiguration and exposing their internal sensitive project and staff details. They also fixed it after I sent out the report to them and was also recognized in theirHall of famelist.

Informatica Jira dashboard publically exposed

Luminate yahoo acquisition having Jira filters publically exposed

These publically available filters and dashboards were providing details such as employees roles, employees names, their mail id, upcoming milestones, secret project, and features. While the user picker functionality discloses internal user data. Useful information for a competitor company to get to know about the kind of upcoming milestones or secret projects their competitor is working upon. Even an attacker can gain some information from this and tie it with some other type of attacks. Clearly, it is something which shouldnt be public. Not a security issue but more of a privacy issue.

I reported this to various companies, some rewarded me, some fixed it while some are still living with it. While it is more of a misconfiguration issue which Atlassian(JIRA) must take care of and be more explicitly clear about what is meant by Any logged-in user whether it is any logged-in user of JIRA or just a logged-in user belonging to a specific Jira company account.

and set the visibility to Private by default and if anyone wants to make their dashboard or filter public, they have to explicitly go to the setting and change them. While user picker functionality settings must also be taken into account.

Lead Infrastructure Security Engineer @groferseng DevSecOps Breaking stuff to learn Acknowledged by Google, NASA, Yahoo, United Nations, BBC etc.

Welcome to a place where words matter. OnWatch

Follow all the topics you care about, and well deliver the best stories for you to your homepage and inbox.Explore

Get unlimited access to the best stories onUpgrade