Lucene search

K
nessusThis script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.JIRA_CVE-2023-26256.NBIN
HistoryOct 23, 2023 - 12:00 a.m.

Jira Server/Data Center STAGIL Navigation plugin Path Traversal CVE-2023-26256

2023-10-2300:00:00
This script is Copyright (C) 2023-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
3
jira server stagil path traversal cve-2023-26256 scanner binary

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.021 Low

EPSS

Percentile

89.2%

The Atlassian JIRA application running on the remote host has plugins enabled. It is ,therefore, potentially affected by an unauthenticated path traversal vulnerability affecting the ‘STAGIL Navigation for Jira - Menu & Themes’ plugin before 2.0.52. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system. (CVE-2023-26256)

Binary data jira_CVE-2023-26256.nbin
VendorProductVersionCPE
atlassianjiracpe:/a:atlassian:jira
stagilstagil_navigationcpe:/a:stagil:stagil_navigation

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.021 Low

EPSS

Percentile

89.2%

Related for JIRA_CVE-2023-26256.NBIN