Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-26256 PoC — Jira plugin STAGIL Navigation 路径遍历漏洞

Source
Associated Vulnerability
Title:Jira plugin STAGIL Navigation 路径遍历漏洞 (CVE-2023-26256)
Description:An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.
Description
CVE-2023-26255_POC,CVE-2023-26256_POC
Readme
## CVE-2023-26255 CVE-2023-26256 POC
```
FOFA: body="JIRA" && body="2.0.50"
```
```
Usage:
  python3 CVE-2023-26256.py -h
```
![示例](https://github.com/jcad123/CVE-2023-26256/blob/main/CVE-2023-26256.jpg)
![示例](https://github.com/jcad123/CVE-2023-26256/blob/main/vulnable.png)
File Snapshot

[4.0K] /data/pocs/3d893919f0ebdb54ead07776e064527e2175cfe9 ├── [151K] CVE-2023-26256.jpg ├── [4.4K] CVE-2023-26256.py ├── [ 284] README.md └── [179K] vulnable.png 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →