-
Public Security Vulnerability
-
Resolution: Fixed
-
High
-
6.13.0, 6.14.0, 7.0.0, 7.1.0, 7.2.0, 7.3.0, 7.13.0, 7.13.1, 7.13.2, 7.13.3, 7.13.4, 7.13.5, 7.13.6, 7.13.7, 7.13.8, 7.13.9, 7.13.10, 7.13.11, 7.13.12, 7.14.0, 7.15.0, 7.16.0, 7.17.0, 7.19.1, 7.19.2, 7.19.3, 7.19.4, 7.19.5, 7.20.0, 8.1.0, 8.2.0, 8.3.0, 7.13.13, 7.19.6, 7.13.14, 7.13.15, 7.13.16, 7.13.17, 7.19.7, 7.19.8, 7.19.9, 6.15.0
-
None
-
9.8
-
Critical
-
CVE-2022-1471
-
Atlassian (Internal)
-
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
-
RCE (Remote Code Execution)
-
Confluence Data Center, Confluence Server
Summary of Vulnerability
Multiple Atlassian Data Center and Server Products use the SnakeYAML library for Java, which is susceptible to a deserialization flaw that can lead to RCE (Remote Code Execution).
Atlassian Cloud sites are not affected by this vulnerability. If your site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Affected Versions
Product | Affected Versions |
---|---|
Confluence Data Center Confluence Server |
|
Fixed Versions
Product | Fixed Versions |
---|---|
Confluence Data Center Confluence Server |
Patch to the following fixed versions or later 7.19.17 (LTS) 8.4.5 8.5.4 (LTS) 8.6.2 (Data Center Only) 8.7.1 (Data Center Only) Fixed in the following versions The fix is contained in 7.13.20, 7.19.10, and 8.3.1, however these versions also contain previously communicated security vulnerabilities. |
What You Need to Do
Atlassian recommends that you upgrade your instance to one of the versions listed in the “Fixed Versions” table section of this ticket. For full descriptions of the above versions of Confluence Data Center and Server, see the release notes. You can download the latest version of Confluence Data Center and Server from the download center.
For additional details, please see the full advisory.