Enhancement: cves/2023/CVE-2023-26255.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-03-22 14:10:52 -04:00
parent 37b0b488e0
commit 56126fa8a9
1 changed files with 5 additions and 3 deletions

View File

@ -1,15 +1,15 @@
id: CVE-2023-26255
info:
name: STAGIL Navigation for Jira - Menu & Themes - Local File Inclusion
name: STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion
author: DhiyaneshDK
severity: high
description: |
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.
STAGIL Navigation for Jira Menu & Themes plugin before 2.0.52 is susceptible to local file inclusion via modifying the fileName parameter to the snjCustomDesignConfig endpoint. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can potentially allow the attacker to steal cookie-based authentication credentials and launch other attacks.
reference:
- https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26255.md
- https://nvd.nist.gov/vuln/detail/CVE-2023-26255
- https://marketplace.atlassian.com/apps/1216090/stagil-navigation-for-jira-menus-themes?tab=overview&hosting=cloud
- https://nvd.nist.gov/vuln/detail/CVE-2023-26255
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
@ -39,3 +39,5 @@ requests:
- type: status
status:
- 200
# Enhanced by md on 2023/03/22