-
Public Security Vulnerability
-
Resolution: Fixed
-
Highest
-
7.20.0, 8.0.0, 4.0.0, 8.6.0
-
None
-
Severity 1 - Critical
-
9
-
Critical
-
CVE-2023-22522
-
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
-
RCE (Remote Code Execution)
-
Confluence Data Center, Confluence Server
Summary of Vulnerability
This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve RCE on an affected instance. Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See “What You Need to Do” for detailed instructions.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Affected Versions
Product | Affected Versions |
---|---|
Confluence Data Center and Server |
|
Confluence Data Center |
|
Fixed Versions
Product | Fixed Versions |
---|---|
Confluence Data Center and Server |
|
Confluence Data Center |
|
What You Need To Do
Immediately patch to a fixed version
Atlassian recommends that you patch each of your affected installations to the latest version or one of the listed fixed versions below.
Product | Fixed Versions |
---|---|
Confluence Data Center and Server |
|
Confluence Data Center |
|
For additional details, please see full advisory.
- is action for
-
PRODSEC-5414 Failed to load
[CONFSERVER-93502] RCE in Confluence Data Center and Server - CVE-2023-22522
Status | Original: Published [ 12873 ] | New: Published [ 12873 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 880203 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 850249 ] |
Labels | Original: advisory advisory-released dont-import fixed-versions-published security | New: advisory advisory-released dont-import fixed-versions-published hot-conf-fixed security |
Comment | [ Why showing Label "fixed-versions-not-yet-published"? ] |
Labels | Original: advisory dont-import fixed-versions-published security | New: advisory advisory-released dont-import fixed-versions-published security |
Labels | New: advisory dont-import fixed-versions-published security |
Labels | Original: fixed-versions-not-yet-published |
Resolution | New: Fixed [ 1 ] | |
Security | Original: Atlassian Staff [ 10750 ] | |
Status | Original: Draft [ 12872 ] | New: Published [ 12873 ] |
Description |
Original:
h2. Summary of Vulnerability
This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve RCE on an affected instance. Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See “What You Need to Do” for detailed instructions. {panel:bgColor=#deebff} Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an [atlassian.net|http://atlassian.net/] domain, it is hosted by Atlassian and is not vulnerable to this issue. {panel} h2. Affected Versions ||Product||Affected Versions|| |Confluence Data Center and Server| * 4.x.x * 5.x.x * 6.x.x * 7.x.x * 8.0.x * 8.1.x * 8.2.x * 8.3.x * 8.4.0 * 8.4.1 * 8.4.2 * 8.4.3 * 8.4.4 * 8.5.0 * 8.5.1 * 8.5.2 * 8.5.3| |Confluence Data Center| * 8.6.0 * 8.6.1| h2. Fixed Versions ||*Product*||*Fixed Versions*|| |Confluence Data Center and Server| * 7.19.17 (LTS) * 8.4.5 * 8.5.4 (LTS)| |Confluence Data Center| * 8.6.2 or later (Data Center Only) * 8.7.0 or later (Data Center Only)| h2. What You Need To Do h3. *Immediately patch to a fixed version* Atlassian recommends that you patch each of your affected installations to the latest version or one of the listed fixed versions below. ||Product||Fixed Versions|| |Confluence Data Center and Server| * 7.19.17 (LTS) * 8.4.5 * 8.5.4 (LTS)| |Confluence Data Center| * 8.6.2 or later (Data Center Only) * 8.7.1 or later (Data Center Only)| For additional details, please see [full advisory|https://confluence.atlassian.com/pages/viewpage.action?pageId=1319570362]. |
New:
h2. Summary of Vulnerability
This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve RCE on an affected instance. Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See “What You Need to Do” for detailed instructions. {panel:bgColor=#deebff} Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an [atlassian.net|http://atlassian.net/] domain, it is hosted by Atlassian and is not vulnerable to this issue. {panel} h2. Affected Versions ||Product||Affected Versions|| |Confluence Data Center and Server| * 4.x.x * 5.x.x * 6.x.x * 7.x.x * 8.0.x * 8.1.x * 8.2.x * 8.3.x * 8.4.0 * 8.4.1 * 8.4.2 * 8.4.3 * 8.4.4 * 8.5.0 * 8.5.1 * 8.5.2 * 8.5.3| |Confluence Data Center| * 8.6.0 * 8.6.1| h2. Fixed Versions ||*Product*||*Fixed Versions*|| |Confluence Data Center and Server| * 7.19.17 (LTS) * 8.4.5 * 8.5.4 (LTS)| |Confluence Data Center| * 8.6.2 or later (Data Center Only) * 8.7.1 or later (Data Center Only)| h2. What You Need To Do h3. *Immediately patch to a fixed version* Atlassian recommends that you patch each of your affected installations to the latest version or one of the listed fixed versions below. ||Product||Fixed Versions|| |Confluence Data Center and Server| * 7.19.17 (LTS) * 8.4.5 * 8.5.4 (LTS)| |Confluence Data Center| * 8.6.2 or later (Data Center Only) * 8.7.1 or later (Data Center Only)| For additional details, please see [full advisory|https://confluence.atlassian.com/pages/viewpage.action?pageId=1319570362]. |