We have identified and fixed a vulnerability in Confluence that results from the way third-party XML parsers are used in Confluence. This vulnerability allows an attacker to:
- Execute denial of service attacks against the Confluence server, or
- Read all local files readable to the system user under which Confluence runs.
The attacker does not need to have an account with the affected Confluence instance.
All versions of Confluence up to and including 4.1.9 are affected.
Full details of the severity, risks and vulnerability can be found in the Confluence Security Advisory 2012-05-17.
Form Name |
---|
Note that 4.1.9 is vulnerable to a small subset of the issues in the advisory. Namely, a logged in administrator is still able to use the Denial of Service exploit. This is a very small risk in most environments and you may be able to treat 4.1.9 as not affected.