CVE-2023-26255
Description
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.
NVD
Severity: HIGH
CVE ID: CVE-2023-26255
CVSS Score: 7.5
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Proof Of Concept
Nuclei Templates for CVE-2023-26255
Refrence: Project Discovery GitHub
tucommenceapousser
Refrence: GitHub
Nian-Stars
Jira plugin STAGIL Navigation FileName的参数任意文件读取漏洞
Refrence: GitHub
Content on GitHub
0x7eTeam | watchers:33
CVE-2023-26256
CVE-2023-26255_POC,CVE-2023-26256_POC
Refrence: GitHub
jcad123 | watchers:3
CVE-2023-26256
CVE-2023-26255_POC,CVE-2023-26256_POC
Refrence: GitHub