Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-26256 PoC — Jira plugin STAGIL Navigation 路径遍历漏洞

Source
Associated Vulnerability
Title:Jira plugin STAGIL Navigation 路径遍历漏洞 (CVE-2023-26256)
Description:An unauthenticated path traversal vulnerability affects the "STAGIL Navigation for Jira - Menu & Themes" plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjFooterNavigationConfig endpoint, it is possible to traverse and read the file system.
Description
CVE-2023-26255_POC,CVE-2023-26256_POC
Readme
## CVE-2023-26255   CVE-2023-26256  POC



```
Usage:
  python3 CVE-2023-26256.py -h
```
![示例](https://github.com/aodsec/CVE-2023-26256/blob/main/CVE-2023-26256.png)
![示例](https://github.com/aodsec/CVE-2023-26256/blob/main/vuln.png)
File Snapshot

[4.0K] /data/pocs/8bc649a44cf3fa1902eadf3a1d37de6a77e9f19d ├── [681K] CVE-2023-26256.png ├── [3.9K] CVE-2023-26256.py ├── [ 241] README.md └── [155K] vuln.png 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →