Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.JIRA_CVE-2023-26255.NBIN
HistoryOct 23, 2023 - 12:00 a.m.

Jira Server/Data Center STAGIL Navigation plugin Path Traversal CVE-2023-26255

2023-10-2300:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
6
jira
stagil navigation
cve-2023-26255
path traversal
vulnerability
scanner
binary data

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.277

Percentile

96.9%

The Atlassian JIRA application running on the remote host has plugins enabled. It is ,therefore, potentially affected by an unauthenticated path traversal vulnerability affecting the ‘STAGIL Navigation for Jira - Menu & Themes’ plugin before 2.0.52. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system. (CVE-2023-26255)

Binary data jira_CVE-2023-26255.nbin

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.277

Percentile

96.9%

Related for JIRA_CVE-2023-26255.NBIN