Attack Matrix
No Attack Matrix Available
MITRE ATT&CK matrix analysis has not been generated for this story yet.
This analysis is automatically generated during story processing and will be available once the AI agents have completed their analysis.
Story: High-Severity Path Traversal Vulnerability in Jira Software
Identified Techniques: T1071 - Application Layer Protocol, T1203, T1068, T1190 - Exploit Public-Facing Application, T1566 - Phishing
Note: Sub-techniques are displayed under their parent techniques in the matrix below.
Legend:
| Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
|---|---|---|---|---|---|---|---|---|---|---|---|
About MITRE ATT&CK®:
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.