The vulnerability allows an authenticated user with access to the Jira plugin to read post content from channels they are not a member of. This is due to a missing authorization check in the mattermost-plugin-jira plugin.
The analysis of the commits between the vulnerable version 4.4.0 and the patched version 4.4.1 of the mattermost-plugin-jira plugin revealed that the fix was implemented in commit bf162b7f899f3bcc43e236a131ebe88090de8bdd.
This commit modifies two main functions, AttachCommentToIssue and CreateIssue in server/issue.go, to include a channel membership check using p.client.Channel.GetMember. Before this change, these functions would process requests to attach posts to Jira issues without verifying if the requesting user had access to the channel where the post originated.
The vulnerable functions are main.Plugin.AttachCommentToIssue and main.Plugin.CreateIssue, along with their corresponding HTTP handlers main.Plugin.httpAttachCommentToIssue and main.Plugin.httpCreateIssue, which act as the entry points for the exploitation of this vulnerability.