Uploaded image for project: 'Confluence Data Center'
  1. Confluence Data Center
  2. CONFSERVER-92475

Broken Authentication & Session Management in Confluence Data Center and Server - CVE-2023-22515

    • Icon: Public Security Vulnerability Public Security Vulnerability
    • Resolution: Fixed
    • Icon: Highest Highest
    • 8.5.2, 8.3.3, 8.4.3
    • 8.0.0, 8.1.0, 8.2.0, 8.3.0, 8.4.0, 8.5.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.1.1, 8.1.3, 8.2.1, 8.1.4, 8.2.2, 8.2.3, 8.3.1, 8.3.2, 8.4.1, 8.4.2, 8.5.1
    • None

      Summary of Vulnerability

      Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
       

      Atlassian Cloud sites are not affected by this vulnerability.

      If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

      Affected Versions

      Versions prior to 8.0.0 are not affected by this vulnerability.

      Product Affected Versions
      Confluence Data Center and Confluence Server
      • 8.0.0
      • 8.0.1
      • 8.0.2
      • 8.0.3
      • 8.0.4
      • 8.1.0
      • 8.1.1
      • 8.1.3
      • 8.1.4
      • 8.2.0
      • 8.2.1
      • 8.2.2
      • 8.2.3
      • 8.3.0
      • 8.3.1
      • 8.3.2
      • 8.4.0
      • 8.4.1
      • 8.4.2
      • 8.5.0
      • 8.5.1

       

      Fixed Versions

      Product Fixed Versions
      Confluence Data Center
      Confluence Server
      • 8.3.3 or later
      • 8.4.3 or later
      • 8.5.2 (Long Term Support release) or later

      What You Need to Do

      For affected versions, we strongly recommend:

      • Upgrading to the fixed versions of Confluence Server or Data Center.
        • If unable to upgrade promptly, implement mitigations (refer to the Mitigations section in the full advisory).
      • Engaging your security team and check for indicators of compromise (refer to the Threat Detection section in the full advisory).

      For additional details, please see the full advisory here: https://confluence.atlassian.com/display/SECURITY/CVE-2023-22515+-+Broken+Access+Control+Vulnerability+in+Confluence+Data+Center+and+Server 

          Form Name

            [CONFSERVER-92475] Broken Authentication & Session Management in Confluence Data Center and Server - CVE-2023-22515

            Cathy S made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 880201 ]
            Dan Hranj made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 871585 ]
            Renata Bueno made changes -
            Remote Link Original: This issue links to "Page (Confluence)" [ 822661 ]
            Renata Bueno made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 871552 ]
            David Maye made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 844369 ]
            Nicole Round made changes -
            Description Original: h2. Summary of Vulnerability

            Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
             
            {panel}
            _Atlassian Cloud sites are not affected by this vulnerability._

            _If your Confluence site is accessed via an [atlassian.net|http://atlassian.net/] domain, it is hosted by Atlassian and is not vulnerable to this issue._
            {panel}
            h2. Affected Versions

            *Versions prior to 8.0.0 are not affected by this vulnerability.*
            ||Product||Affected Versions||
            |Confluence Data Center and Confluence Server| - 8.0.0
             - 8.0.1
             - 8.0.2
             - 8.0.3
             - 8.0.4
             - 8.1.0
             - 8.1.1
             - 8.1.3
             - 8.1.4
             - 8.2.0
             - 8.2.1
             - 8.2.2
             - 8.2.3
             - 8.3.0
             - 8.3.1
             - 8.3.2
             - 8.4.0
             - 8.4.1
             - 8.4.2
             - 8.5.0
             - 8.5.1|

             
            h2. Fixed Versions
            ||Product||Fixed Versions||
            |Confluence Data Center
            Confluence Server| - 8.3.3 or later
             - 8.4.3 or later
             - 8.5.2 (Long Term Support release) or later|
            h2. What You Need to Do

            For affected versions, we strongly recommend:
             * Upgrading to the fixed versions of Confluence Server or Data Center.
             ** If unable to upgrade promptly, implement mitigations (refer to the M{_}itigations{_} section in the full advisory).

             * Engaging your security team and check for indicators of compromise (refer to the _Threat Detection_ section in the full advisory).

            For additional details, please see the full advisory here: [https://confluence.atlassian.com/display/SECURITY/CVE-2023-22518+-+Improper+Authorization+Vulnerability+in+Confluence+Data+Center+and+Server
            New: h2. Summary of Vulnerability

            Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
             
            {panel}
            _Atlassian Cloud sites are not affected by this vulnerability._

            _If your Confluence site is accessed via an [atlassian.net|http://atlassian.net/] domain, it is hosted by Atlassian and is not vulnerable to this issue._
            {panel}
            h2. Affected Versions

            *Versions prior to 8.0.0 are not affected by this vulnerability.*
            ||Product||Affected Versions||
            |Confluence Data Center and Confluence Server| - 8.0.0
             - 8.0.1
             - 8.0.2
             - 8.0.3
             - 8.0.4
             - 8.1.0
             - 8.1.1
             - 8.1.3
             - 8.1.4
             - 8.2.0
             - 8.2.1
             - 8.2.2
             - 8.2.3
             - 8.3.0
             - 8.3.1
             - 8.3.2
             - 8.4.0
             - 8.4.1
             - 8.4.2
             - 8.5.0
             - 8.5.1|

             
            h2. Fixed Versions
            ||Product||Fixed Versions||
            |Confluence Data Center
            Confluence Server| - 8.3.3 or later
             - 8.4.3 or later
             - 8.5.2 (Long Term Support release) or later|
            h2. What You Need to Do

            For affected versions, we strongly recommend:
             * Upgrading to the fixed versions of Confluence Server or Data Center.
             ** If unable to upgrade promptly, implement mitigations (refer to the M{_}itigations{_} section in the full advisory).

             * Engaging your security team and check for indicators of compromise (refer to the _Threat Detection_ section in the full advisory).

            For additional details, please see the full advisory here: [https://confluence.atlassian.com/display/SECURITY/CVE-2023-22515+-+Broken+Access+Control+Vulnerability+in+Confluence+Data+Center+and+Server
            Nicole Round made changes -
            Description Original: h2. Summary of Vulnerability

            Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
             
            {panel}
            _Atlassian Cloud sites are not affected by this vulnerability._

            _If your Confluence site is accessed via an [atlassian.net|http://atlassian.net/] domain, it is hosted by Atlassian and is not vulnerable to this issue._
            {panel}
            h2. Affected Versions

            *Versions prior to 8.0.0 are not affected by this vulnerability.*
            ||Product||Affected Versions||
            |Confluence Data Center and Confluence Server| - 8.0.0
             - 8.0.1
             - 8.0.2
             - 8.0.3
             - 8.0.4
             - 8.1.0
             - 8.1.1
             - 8.1.3
             - 8.1.4
             - 8.2.0
             - 8.2.1
             - 8.2.2
             - 8.2.3
             - 8.3.0
             - 8.3.1
             - 8.3.2
             - 8.4.0
             - 8.4.1
             - 8.4.2
             - 8.5.0
             - 8.5.1|

             
            h2. Fixed Versions
            ||Product||Fixed Versions||
            |Confluence Data Center
            Confluence Server| - 8.3.3 or later
             - 8.4.3 or later
             - 8.5.2 (Long Term Support release) or later|
            h2. What You Need to Do

            For affected versions, we strongly recommend:
             * Upgrading to the fixed versions of Confluence Server or Data Center.
             ** If unable to upgrade promptly, implement mitigations (refer to the M{_}itigations{_} section in the full advisory).

             * Engaging your security team and check for indicators of compromise (refer to the _Threat Detection_ section in the full advisory).

            For additional details, please see the full advisory here: [https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276
            New: h2. Summary of Vulnerability

            Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
             
            {panel}
            _Atlassian Cloud sites are not affected by this vulnerability._

            _If your Confluence site is accessed via an [atlassian.net|http://atlassian.net/] domain, it is hosted by Atlassian and is not vulnerable to this issue._
            {panel}
            h2. Affected Versions

            *Versions prior to 8.0.0 are not affected by this vulnerability.*
            ||Product||Affected Versions||
            |Confluence Data Center and Confluence Server| - 8.0.0
             - 8.0.1
             - 8.0.2
             - 8.0.3
             - 8.0.4
             - 8.1.0
             - 8.1.1
             - 8.1.3
             - 8.1.4
             - 8.2.0
             - 8.2.1
             - 8.2.2
             - 8.2.3
             - 8.3.0
             - 8.3.1
             - 8.3.2
             - 8.4.0
             - 8.4.1
             - 8.4.2
             - 8.5.0
             - 8.5.1|

             
            h2. Fixed Versions
            ||Product||Fixed Versions||
            |Confluence Data Center
            Confluence Server| - 8.3.3 or later
             - 8.4.3 or later
             - 8.5.2 (Long Term Support release) or later|
            h2. What You Need to Do

            For affected versions, we strongly recommend:
             * Upgrading to the fixed versions of Confluence Server or Data Center.
             ** If unable to upgrade promptly, implement mitigations (refer to the M{_}itigations{_} section in the full advisory).

             * Engaging your security team and check for indicators of compromise (refer to the _Threat Detection_ section in the full advisory).

            For additional details, please see the full advisory here: [https://confluence.atlassian.com/display/SECURITY/CVE-2023-22518+-+Improper+Authorization+Vulnerability+in+Confluence+Data+Center+and+Server
            hari made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 826020 ]
            Lee Berg made changes -
            Remote Link New: This issue links to "Page (Confluence)" [ 824682 ]

              Unassigned Unassigned
              5de531f82e45 Lee Berg
              Votes:
              0 Vote for this issue
              Watchers:
              62 Start watching this issue

                Created:
                Updated:
                Resolved: