An unauthenticated path traversal vulnerability in the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 allows system file access
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | CVE-2023-26255 | 28 Feb 202300:00 | – | cvelist |
![]() | STAGIL Navigation for Jira Menu & Themes <2.0.52 - Local File Inclusion | 16 Mar 202312:25 | – | nuclei |
![]() | Path traversal | 28 Feb 202316:15 | – | prion |
![]() | CVE-2023-26255 | 28 Feb 202316:15 | – | nvd |
![]() | Exploit for Path Traversal in Stagil Stagil Navigation | 30 Aug 202323:57 | – | githubexploit |
![]() | Exploit for Path Traversal in Stagil Stagil Navigation | 25 Aug 202321:56 | – | githubexploit |
![]() | Exploit for Path Traversal in Stagil Stagil Navigation | 24 Aug 202301:57 | – | githubexploit |
![]() | Exploit for Path Traversal in Stagil Stagil Navigation | 1 Sep 202300:10 | – | githubexploit |
![]() | Jira Server/Data Center STAGIL Navigation plugin Path Traversal CVE-2023-26255 | 23 Oct 202300:00 | – | nessus |
![]() | CVE-2023-26255 | 28 Feb 202300:00 | – | vulnrichment |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
fileName | query param | /snjCustomDesignConfig | Unauthenticated path traversal vulnerability in STAGIL Navigation for Jira allowing file system access. | CWE-22 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo