Overview
Thejira addcomment command allows you to add a comment to an existing Jira issue. This command is particularly useful for social engineering attacks where you can mention specific users, include malicious links, or provide context that encourages users to click on attacker-controlled resources. Comments can include user mentions (@), custom messages, and embedded links with customizable link text.
Syntax
Required Parameters
The base URL of the target Jira instance (e.g.,
https://company.atlassian.net)The issue key to add the comment to (e.g.,
PROJ-123)The URL to embed in the comment. This can be any attacker-controlled resource for credential harvesting or tracking purposes
Optional Parameters
Authentication cookie (
cloud.session.token or tenant.session.token). If omitted, the command will attempt anonymous access (if permitted by the Jira instance)User ID to mention in the comment. Use the
jira listusers command to obtain valid user IDs. Mentioning users increases the likelihood they’ll see and interact with the commentCustom message text to include in the comment (e.g., “I need you to take a look at this”)
The display text for the embedded link. Customizing this can make the link more enticing (e.g., “Click here for details”, “Download report”)
Save command output to a specified file
Examples
Basic Comment with Link
Add a simple comment with a link to an issue:Social Engineering with User Mention
Create a targeted comment mentioning a specific user with a convincing message:Anonymous Comment (If Allowed)
Attempt to add a comment without authentication:Credential Harvesting Attack
Create a comment designed to harvest credentials:Use Cases
- Red Team
- Blue Team
Offensive Security Applications
- Credential Harvesting: Embed links to fake login pages that mimic Jira or related services
- Phishing Campaigns: Mention specific users and include convincing messages with malicious links
- Reconnaissance: Track which users view comments by embedding 1x1 tracking pixels or unique URLs
- Social Engineering: Leverage trust in internal systems to convince users to click malicious links
- Persistence: Add comments to high-traffic issues to maximize exposure
- Targeted Attacks: Use
--atparameter to directly notify specific high-value targets
Output
The command returns confirmation of the comment addition. The comment will appear in the issue’s activity feed with:- The authenticated user’s name (or “anonymous” if unauthenticated)
- Timestamp of when the comment was added
- The message text (if provided)
- User mentions (if
--atwas used) - The embedded link with customized display text
Detection Considerations
Jira Audit Log Entries
This command generates the following audit log events:issue_comment_created- Records the creation of the comment- Includes: User ID, issue key, timestamp, IP address
Network Indicators
- HTTP POST requests to
/rest/api/3/issue/{issueKey}/comment - User-Agent strings that may differ from standard browsers
- Correlation of comment creation with external URL access patterns
OPSEC Considerations
Cookie Considerations
- Session cookies (
cloud.session.tokenortenant.session.token) can be extracted from user browsers using tools like SharpChrome - Cookies may have session timeouts; verify validity before large-scale operations
- Using anonymous access (where permitted) avoids cookie requirement but may be more restricted
Related Commands
- jira createissue - Create a new issue (can include similar social engineering elements)
- jira listusers - Enumerate users to identify mention targets
- jira listissues - Find high-traffic issues for maximum comment visibility
- jira searchissues - Search for specific issues to target
- jira attach - Attach malicious files to issues (complementary attack vector)