Skip to main content

CVE-2023-26255

Description

An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.

NVD
Severity: HIGH
CVE ID: CVE-2023-26255
CVSS Score: 7.5
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2023-26255
tucommenceapousser

Refrence: GitHub

Nian-Stars

Jira plugin STAGIL Navigation FileName的参数任意文件读取漏洞

Refrence: GitHub

Content on GitHub

0x7eTeam | watchers:33

CVE-2023-26256
CVE-2023-26255_POC,CVE-2023-26256_POC

Refrence: GitHub

jcad123 | watchers:3

CVE-2023-26256
CVE-2023-26255_POC,CVE-2023-26256_POC

Refrence: GitHub