Uploaded image for project: 'Confluence Server and Data Center'
  1. Confluence Server and Data Center
  2. CONFSERVER-20671

XSRF vulnerability in the Mail Page plugin

    XMLWordPrintable

    Details

      Description

      We have identified and fixed a cross-site request forgery (XSRF) vulnerability which may affect Confluence instances in a public environment. The XSRF vulnerability is exposed in the Confluence Mail Page plugin. Note that the Mail Page plugin is disabled by default. If you do not have this plugin enabled, your site will not be affected.

      An attacker might take advantage of the vulnerability to trick users into unintentionally submitting malicious data. An XSRF attack works by exploiting the trust that a site has for the user. If a user is logged into Confluence and an attacker tricks their browser into making a request to a Confluence URL, then the task is performed as the logged in user.

      You can read more about XSRF attacks at cgisecurity and other places on the web:
      http://www.cgisecurity.com/csrf-faq.html

      Please refer to the security advisory for details of the vulnerability, risk assessment and mitigation strategies:
      http://confluence.atlassian.com/x/7ARODQ

        Attachments

          Activity

            People

            Assignee:
            jclark@atlassian.com Joe Clark
            Reporter:
            smaddox SarahA
            Votes:
            0 Vote for this issue
            Watchers:
            0 Start watching this issue

              Dates

              Created:
              Updated:
              Resolved: