We have identified and fixed a cross-site scripting (XSS) vulnerability in the Confluence {toc} macro. All versions from 2.9 to 3.4.8 are affected.
XSS vulnerabilities potentially allow an attacker to embed their own JavaScript into a Confluence page. You can read more about XSS attacks at various places on the web, including these:
- cgisecurity.com: http://www.cgisecurity.com/articles/xss-faq.shtml
- The Web Application Security Consortium: http://projects.webappsec.org/Cross-Site+Scripting
This issue is reported in our security advisory on this page:
https://confluence.atlassian.com/x/MgCzDQ
The page also includes detailed patch instructions.
We recommend to upgrade the product, there have been several other vulnerabilities discovered in 3.0 and above, see http://confluence.atlassian.com/display/DOC/Confluence+Security#ConfluenceSecurity-PublishedSecurityAdvisories
While this plugin may work in other versions of Confluence due to software modularity, you probably still have other vulnerabilities not fixed.