-
Public Security Vulnerability
-
Resolution: Fixed
-
High
-
5.6
-
None
-
7.5
-
High
-
CVE-2024-21679
-
Bug Bounty
-
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
-
DoS (Denial of Service)
-
Confluence Data Center, Confluence Server
This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6 of Confluence Data Center and Server.
With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact on confidentiality, no impact to integrity, high impact to availability, and requires no user interaction.
Affected versions
All Confluence versions from 5.6 onwards apart from 7.19.14 and 8.5.1
Atlassian recommends that Confluence Data Center and Server customers upgrade to the latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
- Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14
- Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1
- Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version
See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html.
You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.
This vulnerability was reported via our Bug Bounty program.
- mentioned in
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...
-
Page Loading...