-
Public Security Vulnerability
-
Resolution: Fixed
-
High
-
7.3.0, 7.19.0, 7.20.0, 8.0.0, 8.1.0, 8.2.0, 8.3.0, 8.4.0, 8.5.0, 8.6.0, 8.8.0, 8.7.1
-
None
-
8.8
-
High
-
Bug Bounty
-
l3yx
-
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
-
Injection
-
Confluence Data Center
This High severity Gatekeeper Injection vulnerability was introduced in versions 7.1.0 of Confluence Data Center.
This Injection vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to modify the actions taken by a system call which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.
Atlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
- Confluence Data Center 7.19: Upgrade to a release greater than or equal to 7.19.21
- Confluence Data Center 8.5: Upgrade to a release greater than or equal to 8.5.8
- Confluence Data Center 8.9: Upgrade to a release greater than or equal to 8.9.0
See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center from the download center (https://www.atlassian.com/software/confluence/download-archives).
This vulnerability was discovered by l3yx and reported via our Bug Bounty program
- mentioned in
-
Page Failed to load
Form Name |
---|
We have had an external vulnerability scan performed against our public web properties (by Tenable), and they flagged a 10.0 against our Confluence, without mentioning a CVE, but referencing this ticket
CONFSERVER-94957.So it is clear that in general, 'the internet' view this as a real issue. We really need Atlassian to either confirm it is a real issue, or tidy up the mess so that it no longer appears in vuln test reports.