{ "Name": "Confluence Viewdecorator.action File Read (CVE-2015-8399)", "Description": "CVE-2015-8399, there is an arbitrary file enumeration read vulnerability in Atlassian Confluence versions before 5.8.17. Attackers can use this vulnerability to enumerate and read files on the server.", "Product": "Confluence", "Homepage": "http://www.atlassian.com/", "DisclosureDate": "2021-06-09", "Author": "atdpa4sw0rd@gmail.com", "GobyQuery": "app=\"Confluence\"", "Level": "3", "Impact": "

Leaking the source code, database configuration files, etc., caused the website to be extremely insecure.

", "Recommendation": "

1. Limited catalog

2. The whitelist limits the readable path

", "References": [ "http://www.securityfocus.com/archive/1/537232/100/0/threaded", "https://www.exploit-db.com/exploits/39170/", "https://nvd.nist.gov/vuln/detail/CVE-2015-8399", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8399" ], "HasExp": true, "ExpParams": [ { "name": "FileName", "type": "createSelect", "value": "/WEB-INF/web.xml,/WEB-INF/decorators.xml,/WEB-INF/glue-config.xml,/WEB-INF/server-config.wsdd,/WEB-INF/sitemesh.xml,/WEB-INF/urlrewrite.xml,/databaseSubsystemContext.xml,/securityContext.xml,/services/statusServiceContext.xml,/com/atlassian/confluence/security/SpacePermission.hbm.xml,/com/atlassian/confluence/user/OSUUser.hbm.xml,/com/atlassian/confluence/security/ContentPermissionSet.hbm.xml,/com/atlassian/confluence/user/ConfluenceUser.hbm.xml", "show": "" } ], "ExpTips": { "Type": "", "Content": "" }, "ScanSteps": null, "ExploitSteps": null, "Tags": [ "File Inclusion" ], "CVEIDs": [ "CVE-2015-8399" ], "CVSSScore": "0.0", "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": null, "Hardware": null } }