Uploaded image for project: 'Confluence Data Center'
  1. Confluence Data Center
  2. CONFSERVER-91258

DoS (Denial of Service) in Confluence Data Center and Server

XMLWordPrintable

    • 7.5
    • High
    • CVE-2024-21679
    • Bug Bounty
    • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    • DoS (Denial of Service)
    • Confluence Data Center, Confluence Server

      This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6 of Confluence Data Center and Server. 
      With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact on confidentiality, no impact to integrity, high impact to availability, and requires no user interaction.

      Affected versions
      All Confluence versions from 5.6 onwards apart from 7.19.14 and 8.5.1

      Atlassian recommends that Confluence Data Center and Server customers upgrade to the latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:

      • Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14
      • Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1
      • Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version

      See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html.

      You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.

      This vulnerability was reported via our Bug Bounty program.

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              1 Vote for this issue
              Watchers:
              50 Start watching this issue

                Created:
                Updated:
                Resolved: