-
Notifications
You must be signed in to change notification settings - Fork 47
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #695 from WesselDIVD/DIVD-2023-00045
DIVD-2023-00045 case file add
- Loading branch information
Showing
2 changed files
with
70 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
--- | ||
layout: case | ||
# Title and excerpt will be used on /cases and the RSS feed so make sure they reflect the case well | ||
title: "Confluence RCE Vulnerability In Confluence Data Center and Confluence Server" | ||
excerpt: "Confluence Data Center and Server RCE vulnerability allow an authorized user, including one with anonymous access, to inject unsafe user input into a Confluence page" | ||
author: Wessel Baltus | ||
lead: Wessel Baltus | ||
researchers: | ||
- Ralph Horn | ||
- Wessel Baltus | ||
# You can use free text here as well. E.g. to indicate that some vulnerabilities don't have CVEs assigned (yet). | ||
cves: | ||
- CVE-2023-22522 | ||
product: | ||
- Confluence Data Center | ||
- Confluence Server | ||
versions: | ||
- All versions on Confluence Data Center and Server proir to 7.19.17 (LTS), 8.4.5, 8.5.4 (LTS) | ||
- All versions on Confluence Data Center only prior to 8.6.2, 8.7.1 | ||
recommendation: "Upgrade to patched versions stated on Atlassian website" | ||
patch_status: Fully patched | ||
#workaround: n/a | ||
status : Open | ||
start: 2023-12-05 | ||
end: | ||
timeline: | ||
- start: 2023-12-05 | ||
end: | ||
event: "Vulnerability reported to Atlasssian Confluence" | ||
- start: 2023-12-05 | ||
end: | ||
event: "Advisory released by atlassian " | ||
- start: 2023-12-09 | ||
end: | ||
event: "DIVD created a list of vulnerable Confluence instancess" | ||
- start: 2022-12-09 | ||
end: | ||
event: "First version of this case file" | ||
#ips: | ||
# ips is used for statistics after the case is closed. If it is not applicable, you can set IPs to n/a (e.g. stolen credentials) | ||
# This field becomes mandatory when the case status is set to 'Closed' | ||
--- | ||
## Summary | ||
| ||
An remote code execution vulnerability has been identified inside Atlassian Confluence Data Center and Server. Data Center and Server versions prior to 7.19.17, 8.4.5, 8.5.4 and Data Center only versions prior to 8.6.2, 8.7.1 are vulnerable. The vulnerabilty allows an authenticated user, including one with anonymous access, to use template injection and obtain remote code execution. | ||
| ||
## What you can do | ||
| ||
Upgrade to patched versions for Data Center and Server: 7.19.17; 8.4.5; 8.5.4. | ||
Upgrade to patched versions for Data Center Only : 8.6.2; 8.7.1. | ||
|
||
| ||
## What we are doing | ||
| ||
DIVD is currently working to identify vulnerable parties and notify these. | ||
We do this by scanning for exposed Atlassian Confluence instances and examining these instances to determine whether the vulnerability is present. | ||
Owners of vulnerable instances receive a notification with the host information and remediation steps. | ||
| ||
{% comment %} Leave this here, so we see a timeline{% endcomment %} | ||
{% include timeline.html %} | ||
| ||
| ||
## More information | ||
* [Atlassian advisory](https://confluence.atlassian.com/security/cve-2023-22522-rce-vulnerability-in-confluence-data-center-and-confluence-server-1319570362.html) | ||
* {% cve CVE-2023-22522 %} |