Enhancement: cves/2023/CVE-2023-26255.yaml by md
parent
37b0b488e0
commit
56126fa8a9
|
@ -1,15 +1,15 @@
|
|||
id: CVE-2023-26255
|
||||
|
||||
info:
|
||||
name: STAGIL Navigation for Jira - Menu & Themes - Local File Inclusion
|
||||
name: STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion
|
||||
author: DhiyaneshDK
|
||||
severity: high
|
||||
description: |
|
||||
An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.
|
||||
STAGIL Navigation for Jira Menu & Themes plugin before 2.0.52 is susceptible to local file inclusion via modifying the fileName parameter to the snjCustomDesignConfig endpoint. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can potentially allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||
reference:
|
||||
- https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26255.md
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2023-26255
|
||||
- https://marketplace.atlassian.com/apps/1216090/stagil-navigation-for-jira-menus-themes?tab=overview&hosting=cloud
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2023-26255
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
|
@ -39,3 +39,5 @@ requests:
|
|||
- type: status
|
||||
status:
|
||||
- 200
|
||||
|
||||
# Enhanced by md on 2023/03/22
|
||||
|
|
Loading…
Reference in New Issue