Vulnerabilites related to atlassian - confluence_server
Vulnerability from fkie_nvd
Published
2024-01-16 05:15
Modified
2024-11-21 08:54
Summary
This High severity Remote Code Execution (RCE) vulnerability was introduced in version 2.1.0 of Confluence Data Center and Server. Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.3 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H allows an unauthenticated attacker to remotely expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release * Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release * Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6315A65C-D63C-4A23-BD87-4CCE7FA41662",
                     versionEndExcluding: "7.19.18",
                     versionStartIncluding: "7.19.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5910506D-FE53-411D-8684-C5477CE44D48",
                     versionEndExcluding: "8.5.5",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30B5862B-E498-44C3-8C73-8474AEA4108D",
                     versionEndExcluding: "8.7.2",
                     versionStartIncluding: "8.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE863B2C-1277-400C-B9A6-9A7895DEDD8C",
                     versionEndExcluding: "7.19.18",
                     versionStartIncluding: "7.19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42A7385-4CBB-4EE3-B227-13CD02C50D8A",
                     versionEndExcluding: "8.5.5",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F31DE4-0A6B-4183-8E74-324DA2BF2BD1",
                     versionEndIncluding: "8.7.2",
                     versionStartIncluding: "8.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This High severity Remote Code Execution (RCE) vulnerability was introduced in version 2.1.0 of Confluence Data Center and Server.\n\nRemote Code Execution (RCE) vulnerability, with a CVSS Score of 8.3 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H allows an unauthenticated attacker to remotely expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release\n* Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release\n* Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).",
      },
      {
         lang: "es",
         value: "Esta vulnerabilidad de ejecución remota de código (RCE) de alta gravedad se introdujo en la versión 2.1.0 de Confluence Data Center and Server. Vulnerabilidad de ejecución remota de código (RCE), con una puntuación CVSS de 8,3 y un vector CVSS de CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H /A:H permite que un atacante no autenticado exponga de forma remota activos en su entorno susceptibles de explotación, lo que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, un alto impacto en la disponibilidad y requiere la interacción del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la última versión; si no puede hacerlo, actualice su instancia a una de las versiones fijas admitidas especificadas: * Confluence Data Center y Server 7.19: actualice a una versión 7.19.18, o cualquier versión superior 7.19.x * Confluence Data Center y Server 8.5: actualice a una versión 8.5.5 o cualquier versión superior 8.5.x * Confluence Data Center y Server 8.7: actualice a una versión 8.7.2 o cualquier versión superior Consulte la notas de la versión (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). Puede descargar la última versión de Confluence Data Center and Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives).",
      },
   ],
   id: "CVE-2024-21672",
   lastModified: "2024-11-21T08:54:50.480",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.6,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-16T05:15:08.537",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-94064",
      },
      {
         source: "nvd@nist.gov",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/security/security-bulletin-january-16-2024-1333335615.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-94064",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-06 03:15
Modified
2024-11-21 04:38
Summary
The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF65FA07-82ED-457A-B57B-40E6BF0E7DDC",
                     versionEndExcluding: "7.0.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:7.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B15CD7E-BA60-416B-BF95-A4789ABA7F97",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.",
      },
      {
         lang: "es",
         value: "El uso de Tomcat en Confluence en el sistema operativo Microsoft Windows antes de la versión 7.0.5 y desde la versión 7.1.0 antes de la versión 7.1.1, permite a atacantes del sistema local, que tienen permiso para escribir un archivo DLL en un directorio en la variable de entorno global path, inyectar código y escalar sus privilegios por medio de una vulnerabilidad de secuestro de DLL.",
      },
   ],
   id: "CVE-2019-20406",
   lastModified: "2024-11-21T04:38:24.457",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-06T03:15:10.747",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-59428",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-59428",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-01-23 21:59
Modified
2024-11-21 02:56
Summary
The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages.
References
cve@mitre.orghttp://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/archive/1/539530/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/93159Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttps://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.htmlVendor Advisory
cve@mitre.orghttps://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.htmlVendor Advisory
cve@mitre.orghttps://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/539530/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/93159Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.htmlVendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "351C6311-8084-42F3-B7A4-A8E53D73FF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAAC3596-B70A-49A8-9062-1501474A5365",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "93D84D4C-7376-4590-8BD7-933F94590C29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA204C29-5582-46B3-8EA5-EA890598F5A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "499688C7-21F0-49E0-9E8F-CDD6D7C768A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4014117A-31F3-4494-9239-6DDFB89DB805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CA9632D-C9F1-448B-8FFD-90FEF0C1C228",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "0883B0DB-DF33-4B80-A870-690D8A794824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "89276664-D60B-40C5-8837-8C4421EACEAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBC2ACC2-E9DA-4C01-9FFD-E23FC7AAC970",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "70460C0E-1BB6-491A-9897-6F1EB5C10BAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1C0E9A8-6031-4F92-A709-F98C23FF6307",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.9.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "6594A7E7-169D-493A-966D-44E6229F9A1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "755F76DA-E7D5-43A0-B441-E734B6A5AE96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE134D2F-B6D7-4DD7-8D69-B44FD79A7E9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD51134D-388F-4698-8993-6D927659DF45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:5.10.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F69A3AE-7B13-4223-8CFD-7C64D5729177",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.26.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED7EB5D9-41D2-4F5A-BB71-8965231E0E91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.26.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AF46F73-B274-4CAC-B09C-22B3922F8AE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.29.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCA2BF59-2057-4D40-9D2D-167DCD65BB36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.29.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "22D74C92-6404-4423-A63E-D8FB73B93FCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:6.31.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F7E859E-FAB5-4814-92C0-EEAD91ED6C76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A142C047-72E7-4A3B-A6D7-798111597569",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F08AE659-167E-478A-A8D4-376E6189C31F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "798FABED-5F49-44C3-AB06-8AA9C5129F29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D0E6E69-4C4C-4AB7-B5EC-98AC16538DB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "243FA02E-0878-4D6F-B421-19B25475A3FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "55AD904B-172D-4743-9424-620C0F8F4D11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B740B376-B549-4455-AFD9-0FB377707AB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_integration_for_hipchat:7.8.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDA633A3-6190-4CF9-B501-427151C90C1F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages.",
      },
      {
         lang: "es",
         value: "El Atlassian Hipchat Integration Plugin para Bitbucket Server 6.26.0 en versiones anteriores a 6.27.5, 6.28.0 en versiones anteriores a 7.3.7 y 7.4.0 en versiones anteriores a 7.8.17; pllugin HipChat para Confluence 6.26.0 en versiones anteriores a 7.8.17; y plugin HipChat para JIRA 6.26.0 en versiones anteriores a 7.8.17 permite a atacantes remotos obtener la clave secreta para comunicarse con instancias HipChat leyendo páginas no especificadas.",
      },
   ],
   id: "CVE-2016-6668",
   lastModified: "2024-11-21T02:56:35.170",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-01-23T21:59:02.360",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/539530/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/93159",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/539530/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/93159",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-01-19 01:15
Modified
2024-11-21 05:24
Summary
Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E001413-D8E1-41F1-9F61-08C0D2AC1FC0",
                     versionEndExcluding: "7.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57E526-A4D8-4F39-96E3-BABA3108FA05",
                     versionEndExcluding: "7.2.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.",
      },
      {
         lang: "es",
         value: "Las versiones afectadas de Atlassian Confluence Server y Data Center permiten a atacantes remotos afectar la disponibilidad de la aplicación por medio de una vulnerabilidad de Denegación de Servicio (DoS) en la funcionalidad de carga del avatar. Las versiones afectadas son anteriores a la versión 7.2.0",
      },
   ],
   id: "CVE-2020-29450",
   lastModified: "2024-11-21T05:24:01.693",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 4,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-01-19T01:15:14.603",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-60854",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-60854",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-434",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-02-22 21:15
Modified
2024-11-21 05:24
Summary
The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "55705C1C-CF3D-4CD9-9341-83820CD3471F",
                     versionEndExcluding: "6.13.18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C180A5-FDF6-4F41-ACAC-46BEECF8333E",
                     versionEndExcluding: "7.4.6",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CA7E7A7-B7FD-4B5B-B8BA-1A83470A6FE7",
                     versionEndExcluding: "7.8.3",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC13F7E7-5DE0-4D04-BA05-4287DB34912E",
                     versionEndExcluding: "6.13.18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "33104D47-DD3C-4068-95F6-EEFC60D7E0F8",
                     versionEndExcluding: "7.4.6",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D74D7B97-4FCB-4E7E-9C20-5AC2CF2FB2F1",
                     versionEndExcluding: "7.8.3",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.",
      },
      {
         lang: "es",
         value: "La clase ConfluenceResourceDownloadRewriteRule en Confluence Server y Confluence Data Center versiones anteriores a 6.13.18, desde 6.14.0 anteriores a 7.4.6 y desde 7.5.0 anteriores a 7.8.3, permitía a atacantes remotos no autenticados leer archivos arbitrarios dentro de los directorios WEB-INF y META-INF por medio de una comprobación de acceso de una ruta incorrecta",
      },
   ],
   id: "CVE-2020-29448",
   lastModified: "2024-11-21T05:24:01.560",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-02-22T21:15:19.460",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-60469",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-60469",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-16 05:15
Modified
2024-11-21 07:44
Summary
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 7.19.0 of Confluence Data Center. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release 7.19.17, or any higher 7.19.x release Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html]). You can download the latest version of Confluence Data Center from the download center ([https://www.atlassian.com/software/confluence/download-archives]). This vulnerability was discovered by m1sn0w and reported via our Bug Bounty program



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFAC515C-172B-44D9-89A9-062F33E644E7",
                     versionEndExcluding: "7.19.17",
                     versionStartIncluding: "7.19.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5910506D-FE53-411D-8684-C5477CE44D48",
                     versionEndExcluding: "8.5.5",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30B5862B-E498-44C3-8C73-8474AEA4108D",
                     versionEndExcluding: "8.7.2",
                     versionStartIncluding: "8.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56354085-184F-4B7A-B384-34A0D3B38EE0",
                     versionEndExcluding: "7.19.17",
                     versionStartIncluding: "7.19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42A7385-4CBB-4EE3-B227-13CD02C50D8A",
                     versionEndExcluding: "8.5.5",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F31DE4-0A6B-4183-8E74-324DA2BF2BD1",
                     versionEndIncluding: "8.7.2",
                     versionStartIncluding: "8.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This High severity RCE (Remote Code Execution) vulnerability was introduced in version 7.19.0 of Confluence Data Center.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.\r\n\r\nAtlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Confluence Data Center and Server 7.19: Upgrade to a release 7.19.17, or any higher 7.19.x release\r\n Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release\r\n Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release\r\n\r\nSee the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html]). You can download the latest version of Confluence Data Center from the download center ([https://www.atlassian.com/software/confluence/download-archives]).\r\n\r\nThis vulnerability was discovered by m1sn0w and reported via our Bug Bounty program",
      },
      {
         lang: "es",
         value: "Esta vulnerabilidad RCE (ejecución remota de código) de alta gravedad se introdujo en la versión 7.19.0 de Confluence Data Center. Esta vulnerabilidad RCE (ejecución remota de código), con una puntuación CVSS de 7,2, permite a un atacante autenticado ejecutar código arbitrario que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, un alto impacto en la disponibilidad y no requiere interacción del usuario. Atlassian recomienda que los clientes de Confluence Data Center actualicen a la última versión; si no pueden hacerlo, actualicen su instancia a una de las versiones fijas admitidas especificadas: Confluence Data Center y Server 7.19: actualice a una versión 7.19.17 o superior. Versión 7.19.x Confluence Data Center y Server 8.5: actualice a una versión 8.5.5 o superior. 8.5.x Confluence Data Center y Server 8.7: actualice a una versión 8.7.2 o superior. Consulte las notas de la versión ([https ://confluence.atlassian.com/doc/confluence-release-notes-327.html]). Puede descargar la última versión de Confluence Data Center desde el centro de descargas ([https://www.atlassian.com/software/confluence/download-archives]). Esta vulnerabilidad fue descubierta por m1sn0w y reportada a través de nuestro programa Bug Bounty.",
      },
   ],
   id: "CVE-2023-22526",
   lastModified: "2024-11-21T07:44:58.907",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-16T05:15:07.933",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-93516",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-93516",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-20 18:15
Modified
2024-11-21 06:53
Summary
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
References
security@atlassian.comhttps://jira.atlassian.com/browse/BAM-21795Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/BSERV-13370Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/CONFSERVER-79476Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/CRUC-8541Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/CWD-5815Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/FE-7410Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/JRASERVER-73897Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/JSDSERVER-11863Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/BAM-21795Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/BSERV-13370Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CONFSERVER-79476Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CRUC-8541Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CWD-5815Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/FE-7410Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/JRASERVER-73897Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/JSDSERVER-11863Issue Tracking, Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "218C960A-04C6-4242-BEBA-C81CF5F1F722",
                     versionEndExcluding: "7.2.10",
                     versionStartIncluding: "7.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E360CDE0-FD1E-4337-8268-DB89CF605EE0",
                     versionEndExcluding: "8.0.9",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0913EE0-2046-4E7E-966D-DC894E34D12B",
                     versionEndExcluding: "8.1.8",
                     versionStartIncluding: "8.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D182C1B1-A5FF-4777-9835-4E9114BB68DC",
                     versionEndExcluding: "8.2.4",
                     versionStartIncluding: "8.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DCD53E4-3169-4E8A-88D1-38BE51D09DD3",
                     versionEndExcluding: "7.6.16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B878E40-95A7-40A7-9C52-6BC0C2FD3F54",
                     versionEndExcluding: "7.17.8",
                     versionStartIncluding: "7.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "46305D5A-7F7B-4A04-9DAD-E582D1193A7E",
                     versionEndExcluding: "7.19.5",
                     versionStartIncluding: "7.18.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A96B135B-9272-457E-A557-6566554262D3",
                     versionEndExcluding: "7.20.2",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "62956861-BEDE-40C8-B628-C831087E7BDB",
                     versionEndExcluding: "7.21.2",
                     versionStartIncluding: "7.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A85565F-3F80-4E00-A706-AB4B2EAA4AFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "99E2E3C0-CDF0-4D79-80A6-85E71B947ED9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C543CA6-8E8A-476C-AB27-614DF4EC68A5",
                     versionEndExcluding: "7.4.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45FD913B-45DE-4CA8-9733-D62F54B19E74",
                     versionEndExcluding: "7.13.7",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "12E753EB-0D31-448B-B8DE-0A95434CC97C",
                     versionEndExcluding: "7.14.3",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE114494-74F0-454C-AAC4-8B8E5F1C67D0",
                     versionEndExcluding: "7.15.2",
                     versionStartIncluding: "7.15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "90BB3572-29ED-415F-AD34-00EB76271F9C",
                     versionEndExcluding: "7.16.4",
                     versionStartIncluding: "7.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30EF756A-B4E9-4E5D-BE6F-02CE95F12C9C",
                     versionEndExcluding: "7.17.4",
                     versionStartIncluding: "7.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A56B6A10-E23F-49EF-8C07-1AEDFCAE2788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE8BE634-1599-4790-9410-6CA43BC60C4D",
                     versionEndExcluding: "7.4.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "52E68DFD-48F5-4949-AFEA-3829CA5DFC04",
                     versionEndExcluding: "7.13.7",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DCDEC6C-4515-4CAA-9D82-7BF68A3AAE7E",
                     versionEndExcluding: "7.14.3",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9948F94-DF67-4E3C-8CD4-417D57FBC60F",
                     versionEndExcluding: "7.15.2",
                     versionStartIncluding: "7.15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30E63ECB-85A8-4D41-A9B5-9FFF18D9CDB1",
                     versionEndExcluding: "7.16.4",
                     versionStartIncluding: "7.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "694171BD-FAE2-472C-8183-04BCA2F7B9A7",
                     versionEndExcluding: "7.17.4",
                     versionStartIncluding: "7.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AC5E81B-DA4B-45E7-9584-4B576E49FD8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE028964-B3FC-4883-9967-68DE46EE7F6F",
                     versionEndExcluding: "4.3.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "57DC9E2A-4C89-420D-9330-F11E56BF2F83",
                     versionEndExcluding: "4.4.2",
                     versionStartIncluding: "4.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C50A718F-C67B-4462-BB7E-F80408DEF07D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "92329A2E-13E8-4818-85AB-3E7F479411EF",
                     versionEndExcluding: "4.8.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30DDE751-CA88-4CFB-9E60-4243851B4B53",
                     versionEndExcluding: "4.8.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D91B8507-A7A7-4B74-9999-F1DEA9F487A9",
                     versionEndExcluding: "8.13.22",
                     versionStartIncluding: "8.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "963AE427-2897-42CB-AE11-654D700E690B",
                     versionEndExcluding: "8.20.10",
                     versionStartIncluding: "8.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7CD8891-BB97-4AD3-BEE4-6CCA0D8A2D85",
                     versionEndExcluding: "8.22.4",
                     versionStartIncluding: "8.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E73A5202-6114-48E6-8F9B-C03B2E707055",
                     versionEndExcluding: "8.13.22",
                     versionStartIncluding: "8.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D22AB11D-1D73-45DC-803C-146EFED18CDA",
                     versionEndExcluding: "8.20.10",
                     versionStartIncluding: "8.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB2091E9-0B14-4786-852F-454C56D20839",
                     versionEndExcluding: "8.22.4",
                     versionStartIncluding: "8.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:data_center:*:*:*",
                     matchCriteriaId: "1451C219-8AAA-4165-AE2C-033EF7B6F93A",
                     versionEndExcluding: "4.13.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:server:*:*:*",
                     matchCriteriaId: "BD23F987-0F14-4938-BB51-4EE61C24EB62",
                     versionEndExcluding: "4.13.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",
                     matchCriteriaId: "39F77953-41D7-4398-9F07-2A057A993762",
                     versionEndExcluding: "4.20.10",
                     versionStartIncluding: "4.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*",
                     matchCriteriaId: "CADBE0E7-36D9-4F6F-BEE6-A1E0B9428C2A",
                     versionEndExcluding: "4.20.10",
                     versionStartIncluding: "4.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",
                     matchCriteriaId: "DC0DB08B-2034-4691-A7B2-3E5F8B6318B1",
                     versionEndExcluding: "4.22.4",
                     versionStartIncluding: "4.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*",
                     matchCriteriaId: "97A17BE7-7CCC-46D8-A317-53E2B026DF6E",
                     versionEndExcluding: "4.22.4",
                     versionStartIncluding: "4.21.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad en diversos productos de Atlassian permite a un atacante remoto no autenticado causar que sean invocados Filtros Servlet adicionales cuando la aplicación procesa peticiones o respuestas. Atlassian ha confirmado y corregido el único problema de seguridad conocido asociado a esta vulnerabilidad: Omisión de recursos de origen cruzado (CORS). El envío de una petición HTTP especialmente diseñada puede invocar el filtro Servlet usado para responder a las peticiones CORS, resultando en una omisión de CORS. Un atacante que pueda engañar a un usuario para que solicite una URL maliciosa puede acceder a la aplicación vulnerable con los permisos de la víctima. Están afectadas las versiones de Atlassian Bamboo anteriores a 8.0.9, desde la 8.1.0 anteriores a 8.1.8 y de la 8.2.0 anteriores a 8.2.4. Las versiones de Atlassian Bitbucket están afectadas anteriores a 7.6.16, desde la 7.7.0 anteriores a 7.17.8, desde la 7.18.0 anteriores a 7.19.5, desde la 7.20.0 anteriores a 7.20.2, desde la 7.21.0 anteriores a 7.21.2, y las versiones 8.0.0 y 8.1.0. Están afectadas las versiones de Atlassian Confluence anteriores a 7.4.17, desde la 7.5.0 anteriores a 7.13.7, desde la 7.14.0 anteriores a 7.14.3, desde la 7.15.0 anteriores a 7.15.2, desde la 7.16.0 anteriores a 7.16.4, desde la 7.17.0 anteriores a 7.17.4 y la versión 7.21.0. Están afectadas las versiones de Atlassian Crowd anteriores a 4.3.8, desde la 4.4.0 hasta 4.4.2, y la versión 5.0.0. Están afectadas las versiones de Atlassian Fisheye y Crucible anteriores a 4.8.10. Están afectadas las versiones de Atlassian Jira anteriores a 8.13.22, desde la 8.14.0 hasta 8.20.10, y desde la 8.21.0 hasta 8.22.4. Las versiones de Atlassian Jira Service Management están afectadas anteriores a 4.13.22, desde la 4.14.0 anteriores a 4.20.10, y desde la 4.21.0 anteriores a 4.22.4",
      },
   ],
   id: "CVE-2022-26137",
   lastModified: "2024-11-21T06:53:30.583",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2022-07-20T18:15:08.557",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/BAM-21795",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/BSERV-13370",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CRUC-8541",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CWD-5815",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/FE-7410",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JRASERVER-73897",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/BAM-21795",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/BSERV-13370",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CRUC-8541",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CWD-5815",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/FE-7410",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JRASERVER-73897",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-180",
            },
         ],
         source: "security@atlassian.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-346",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-05-07 06:15
Modified
2025-02-12 21:15
Summary
Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDECC179-1EDD-4148-938C-B52385482B99",
                     versionEndExcluding: "7.4.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD4875C-4FEF-487C-A1C4-99EB5B1F7F3E",
                     versionEndExcluding: "7.11.0",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.",
      },
      {
         lang: "es",
         value: "Las versiones afectadas de Confluence Server anteriores a la 7.4.8, y las versiones de la 7.5.0 anteriores a la 7.11.0 permiten a los atacantes identificar hosts y puertos internos a través de una vulnerabilidad de falsificación de solicitudes del lado del servidor en los parámetros de Team Calendars",
      },
   ],
   id: "CVE-2020-29445",
   lastModified: "2025-02-12T21:15:10.103",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2021-05-07T06:15:09.090",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-61453",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-61453",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-918",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-918",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-04-22 04:15
Modified
2024-11-21 04:38
Summary
The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "627C7DA6-843C-4F1E-A560-E533CB0CB4DD",
                     versionEndIncluding: "6.14.3",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "14ADE4E5-F3DD-4EC2-AD2C-4EACA97FF2F7",
                     versionEndExcluding: "6.15.5",
                     versionStartIncluding: "6.15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.",
      },
      {
         lang: "es",
         value: "La funcionalidad de carga de archivos adjuntos en Atlassian Confluence Server desde versión 6.14.0 hasta versión 6.14.3, y versión 6.15.0 anterior a versión 6.15.5, permite a atacantes remotos lograr un ataque de tipo cross-site-scripting almacenado (SXSS) por medio de un archivo adjunto malicioso con un parámetro \"mimeType\" modificado.",
      },
   ],
   id: "CVE-2019-20102",
   lastModified: "2024-11-21T04:38:04.167",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-04-22T04:15:10.897",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-59358",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-59358",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-08-03 00:15
Modified
2025-02-07 13:15
Summary
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.



{
   cisaActionDue: "2022-04-18",
   cisaExploitAdd: "2022-03-28",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Atlassian Confluence Server Pre-Authorization Arbitrary File Read Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83557716-7A48-48D5-85A9-4A29DBF4F511",
                     versionEndExcluding: "7.4.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A310D77-1FFF-4FFE-AD50-75DFF973EB3F",
                     versionEndExcluding: "7.12.3",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA04112-3B97-491B-93E6-80C444274430",
                     versionEndExcluding: "7.4.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1148DF0-42C0-435F-A6EB-EFA93E10E8D7",
                     versionEndExcluding: "7.12.3",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.",
      },
      {
         lang: "es",
         value: "Las versiones afectadas de Atlassian Confluence Server permiten a los atacantes remotos visualizar recursos restringidos por medio de una vulnerabilidad de lectura arbitraria de archivos de autorización previa en el endpoint /s/. Las versiones afectadas son anteriores a la versión 7.4.10 y desde la versión 7.5.0 anteriores a 7.12.3",
      },
   ],
   id: "CVE-2021-26085",
   lastModified: "2025-02-07T13:15:31.860",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2021-08-03T00:15:08.557",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-67893",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-67893",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-425",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-425",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-31 15:15
Modified
2025-02-10 17:57
Severity ?
Summary
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.



{
   cisaActionDue: "2023-11-28",
   cisaExploitAdd: "2023-11-07",
   cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
   cisaVulnerabilityName: "Atlassian Confluence Data Center and Server Improper Authorization Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EFE3358-3C6B-4C54-98B4-E573AC0C6A43",
                     versionEndExcluding: "7.19.16",
                     versionStartIncluding: "1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "65733215-581D-4F2A-B023-899386A4A59C",
                     versionEndExcluding: "8.3.4",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "56B04148-6AE0-4FD2-BD3D-B07A9E62F229",
                     versionEndExcluding: "8.4.4",
                     versionStartIncluding: "8.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3660C634-0DB0-40B2-A905-1E00360A53FB",
                     versionEndExcluding: "8.5.3",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:8.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "05E3896A-C145-44DB-8370-9263A139765D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "949F14BD-CBDD-4633-8A72-3CA2B6310CBB",
                     versionEndExcluding: "7.19.16",
                     versionStartIncluding: "1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "06FD0F88-133B-4421-8644-1948FDA2AA65",
                     versionEndExcluding: "8.3.4",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F459BB01-A089-4128-93AD-A71FE3B49E22",
                     versionEndExcluding: "8.4.4",
                     versionStartIncluding: "8.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA741B1-9AA7-42F6-8F50-32FE732D25D5",
                     versionEndExcluding: "8.5.3",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:8.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E995F8F6-E9A6-4076-8AE8-38A28A5F58D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. \n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.",
      },
      {
         lang: "es",
         value: "Todas las versiones de Confluence Data Center y Server se ven afectadas por esta vulnerabilidad no explotada. No hay ningún impacto en la confidencialidad ya que un atacante no puede filtrar ningún dato de la instancia. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a través de un dominio atlassian.net, está alojado en Atlassian y no es vulnerable a este problema.",
      },
   ],
   id: "CVE-2023-22518",
   lastModified: "2025-02-10T17:57:38.567",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-10-31T15:15:08.573",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-93142",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-93142",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-863",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-863",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-07-01 02:15
Modified
2024-11-21 05:32
Summary
Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.
References
security@atlassian.comhttps://jira.atlassian.com/browse/CONFSERVER-59898Issue Tracking, Patch, Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CONFSERVER-59898Issue Tracking, Patch, Release Notes, Vendor Advisory
Impacted products
Vendor Product Version
atlassian confluence *
atlassian confluence_server *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BA01DD0-D61B-4307-8829-06BECB697AE8",
                     versionEndExcluding: "7.4.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "32D81366-EB40-4F36-B19B-18DEC20953F1",
                     versionEndExcluding: "7.5.1",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.",
      },
      {
         lang: "es",
         value: "Las versiones afectadas de Atlassian Confluence Server y Data Center permitían a los atacantes remotos con permisos de administración del sistema saltarse las mitigaciones de inyección de plantillas de velocidad a través de una vulnerabilidad de inyección en las macros de usuario personalizadas. Las versiones afectadas son anteriores a la versión 7.4.5, y desde la versión 7.5.0 hasta la versión 7.5.1",
      },
   ],
   id: "CVE-2020-4027",
   lastModified: "2024-11-21T05:32:10.850",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "LOW",
               baseScore: 4.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-07-01T02:15:12.350",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-59898",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Release Notes",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-59898",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-74",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-20 18:15
Modified
2025-02-19 19:48
Severity ?
Summary
The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.



{
   cisaActionDue: "2022-08-19",
   cisaExploitAdd: "2022-07-29",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:questions_for_confluence:2.7.34:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0CE5D29-4DCB-48E5-9F1E-E603E5F6C27E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:questions_for_confluence:2.7.35:*:*:*:*:*:*:*",
                     matchCriteriaId: "60DEB66E-75A9-4C34-9E06-037BE1B263EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:questions_for_confluence:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AD33916-41E6-45BB-A6CC-9ECD4F11A529",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5AB7C4D-ED56-4AB5-BD03-CA807D11C46E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9157ABD-3C98-4742-AE63-EAD7504CDB22",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.",
      },
      {
         lang: "es",
         value: "La aplicación Atlassian Questions For Confluence para Confluence Server y Data Center crea una cuenta de usuario de Confluence en el grupo confluence-users con el nombre de usuario disabledsystemuser y una contraseña embebida. Un atacante remoto no autenticado que conozca la contraseña embebida podría explotar esta situación para iniciar sesión en Confluence y acceder a todo el contenido accesible para usuarios del grupo confluence-users. Esta cuenta de usuario es creada cuando son instaladas las versiones 2.7.34, 2.7.35 y 3.0.2 de la aplicación",
      },
   ],
   id: "CVE-2022-26138",
   lastModified: "2025-02-19T19:48:00.467",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-07-20T18:15:08.617",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-07-20-1142446709.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-79483",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-07-20-1142446709.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-79483",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-798",
            },
         ],
         source: "security@atlassian.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-798",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-16 05:15
Modified
2024-11-21 08:54
Summary
This High severity Remote Code Execution (RCE) vulnerability was introduced in versions 7.13.0 of Confluence Data Center and Server. Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.0 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H allows an authenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and does not require user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release * Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release * Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6315A65C-D63C-4A23-BD87-4CCE7FA41662",
                     versionEndExcluding: "7.19.18",
                     versionStartIncluding: "7.19.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5910506D-FE53-411D-8684-C5477CE44D48",
                     versionEndExcluding: "8.5.5",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30B5862B-E498-44C3-8C73-8474AEA4108D",
                     versionEndExcluding: "8.7.2",
                     versionStartIncluding: "8.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE863B2C-1277-400C-B9A6-9A7895DEDD8C",
                     versionEndExcluding: "7.19.18",
                     versionStartIncluding: "7.19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42A7385-4CBB-4EE3-B227-13CD02C50D8A",
                     versionEndExcluding: "8.5.5",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F31DE4-0A6B-4183-8E74-324DA2BF2BD1",
                     versionEndIncluding: "8.7.2",
                     versionStartIncluding: "8.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This High severity Remote Code Execution (RCE) vulnerability was introduced in versions 7.13.0 of Confluence Data Center and Server.\n\nRemote Code Execution (RCE) vulnerability, with a CVSS Score of 8.0 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H allows an authenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and does not require user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release\n* Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release\n* Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).",
      },
      {
         lang: "es",
         value: "Esta vulnerabilidad de ejecución remota de código (RCE) de alta gravedad se introdujo en las versiones 7.13.0 de Confluence Data Center y Server. Vulnerabilidad de ejecución remota de código (RCE), con una puntuación CVSS de 8,0 y un vector CVSS de CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H /A:H permite que un atacante autenticado exponga activos en su entorno susceptibles de explotación, lo que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, un alto impacto en la disponibilidad y no requiere interacción del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la última versión; si no puede hacerlo, actualice su instancia a una de las versiones fijas admitidas especificadas: * Confluence Data Center y Server 7.19: actualice a una versión 7.19.18, o cualquier versión superior 7.19.x * Confluence Data Center y Server 8.5: actualice a una versión 8.5.5 o cualquier versión superior 8.5.x * Confluence Data Center y Server 8.7: actualice a una versión 8.7.2 o cualquier versión superior Consulte la notas de la versión (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). Puede descargar la última versión de Confluence Data Center and Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives).",
      },
   ],
   id: "CVE-2024-21673",
   lastModified: "2024-11-21T08:54:50.613",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.3,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-16T05:15:08.730",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-94065",
      },
      {
         source: "nvd@nist.gov",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/security/security-bulletin-january-16-2024-1333335615.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-94065",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-04-30 16:29
Modified
2024-11-21 04:01
Summary
Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2693A891-F156-4E34-B8FE-C5B50B3B4864",
                     versionEndExcluding: "5.0.11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40944714-8855-458B-B776-0AF4E2AE7CDF",
                     versionEndExcluding: "5.2.10",
                     versionStartIncluding: "5.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4225CCB-FD35-4B93-BC1E-85F0E83383E0",
                     versionEndExcluding: "5.3.6",
                     versionStartIncluding: "5.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68F3DE59-0A8E-40F9-901D-F2D3C0EA546F",
                     versionEndExcluding: "5.4.12",
                     versionStartIncluding: "5.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:application_links:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5414E46-B9B0-4ABF-9DDF-C1EBB8E829AE",
                     versionEndExcluding: "6.0.4",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1777CAE-0B14-4AD2-873F-CF5D3A0B79E4",
                     versionEndExcluding: "6.15.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D64E9D0-0393-4871-AEE3-0D4CAD045EAE",
                     versionEndExcluding: "6.15.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF812D66-1379-4421-B192-21BF9F51C1EE",
                     versionEndExcluding: "3.4.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C140AB4-C751-4D25-B1E7-BC1729D25B4D",
                     versionEndExcluding: "4.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "40DD6225-F761-4E32-B6E9-45A9C79D4AD2",
                     versionEndExcluding: "4.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "75BBC078-951C-4109-A8E5-F13DD36CE837",
                     versionEndExcluding: "7.13.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A2B3FB-45D3-4DB2-B10C-68E827E72837",
                     versionEndExcluding: "8.1.0",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF7E474F-E673-4414-A534-8E709AC6CBFF",
                     versionEndExcluding: "7.13.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "660409CF-397F-4D27-A331-37414A5547E5",
                     versionEndExcluding: "8.1.0",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.",
      },
      {
         lang: "es",
         value: "Application Links anterior a la versión 5.0.11, desde la versión 5.1.0 a la 5.2.10, desde la versión 5.3.0 a la 5.3.6, desde la versión 5.4.0 a la 5.4.12, y desde la versión 6.0.0 a la 6.0.4, permite a atacantes remotos inyectar HTML o JavaScript arbitrario por medio de una vulnerabilidad de tipo cross site scripting (XSS) en el parámetro applinkStartingUrl. El producto es usado como un complemento en varios productos de Atlassian donde se ven impactados los siguientes: Confluence anterior a la versión 6.15.2, Crucible before anterior a la versión 4.7.0, Crowd anterior a la versión 3.4.3, Fisheye anterior a la versión 4.7.0, Jira anterior a la versión 7.13.3 y versión 8.x anterior a 8.1.0.",
      },
   ],
   id: "CVE-2018-20239",
   lastModified: "2024-11-21T04:01:08.853",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-04-30T16:29:00.247",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://ecosystem.atlassian.net/browse/APL-1373",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-58208",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CRUC-8379",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CWD-5362",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/FE-7161",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JRASERVER-68855",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://ecosystem.atlassian.net/browse/APL-1373",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-58208",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CRUC-8379",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CWD-5362",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/FE-7161",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JRASERVER-68855",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2017-04-27 10:59
Modified
2024-11-21 03:31
Summary
Atlassian Confluence 6.x before 6.0.7 allows remote attackers to bypass authentication and read any blog or page via the drafts diff REST resource.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:6.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7072C943-2D2F-4705-B466-805F85B6C9EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:6.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7622CDD-9887-4DBE-976B-1A5A10B3CC60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:6.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B4B2170-60A0-40FC-82DC-F11E7A53A1FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:6.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E49DAA2-5CA3-4E60-A0C3-4423F875B171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:6.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7279C1F-98AC-4523-BA0E-C26425BFE377",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:6.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "87A1B3E9-743C-425E-9FE2-06B974D8EAF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:6.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB92B6D7-BB3B-4E10-8797-540A90297DA4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Atlassian Confluence 6.x before 6.0.7 allows remote attackers to bypass authentication and read any blog or page via the drafts diff REST resource.",
      },
      {
         lang: "es",
         value: "Atlassian Confluence 6.x antes de 6.0.7 permite a los atacantes remotos eludir la autenticación y leer cualquier blog o página a través del recurso drafts diff REST.",
      },
   ],
   id: "CVE-2017-7415",
   lastModified: "2024-11-21T03:31:51.300",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: true,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2017-04-27T10:59:00.143",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97961",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-52222",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/97961",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-52222",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-03-25 19:29
Modified
2024-11-21 04:42
Severity ?
Summary
The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8701B6A3-95BA-4C0C-B89D-29326EFFCABE",
                     versionEndExcluding: "6.6.12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1923B735-5D8A-4BDE-8200-EFF85FB5C362",
                     versionEndExcluding: "6.12.3",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "675FE700-8FDB-44DD-9C8E-82DE7CB8BE1C",
                     versionEndExcluding: "6.13.3",
                     versionStartIncluding: "6.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68B7D049-4672-4914-A6BC-A311FC617128",
                     versionEndExcluding: "6.14.2",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery.",
      },
      {
         lang: "es",
         value: "El endpoint WebDAV en Atlassian Confluence Server and Data Center en versiones anteriores a la 6.6.7 (la versión solucionada para 6.6.x), desde la versión 6.7.0 hasta antes de la 6.8.5 (la versión solucionada para 6.8.x) y desde la versión 6.9.0 hasta antes de la 6.9.3 (la versión solucionada para 6.9.x) permite a los atacantes remotos enviar peticiones arbitrarias HTTP y WebDAV desde una instancia de Confluence Server or Data Center a través de una Server-Side Request Forgery.",
      },
   ],
   id: "CVE-2019-3395",
   lastModified: "2024-11-21T04:42:01.480",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-03-25T19:29:01.617",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-57971",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-57971",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-918",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-18 21:15
Modified
2024-11-21 07:44
Summary
This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22505 was introduced in version 8.0.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 8.3.2, 8.4.0. See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html).|https://confluence.atlassian.com/doc/confluence-release-notes-327.html).] You can download the latest version of Confluence Data Center & Server from the download center ([https://www.atlassian.com/software/confluence/download-archives).|https://www.atlassian.com/software/confluence/download-archives).] This vulnerability was discovered by a private user and reported via our Bug Bounty program.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4502C12-1DC4-41A0-91A5-4D105D21D9FB",
                     versionEndExcluding: "8.3.2",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D643B5D8-E584-45E0-8112-2B0274213C34",
                     versionEndExcluding: "8.3.2",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22505 was introduced in version 8.0.0 of Confluence Data Center & Server.\n\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.\n\nAtlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 8.3.2, 8.4.0. See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html).|https://confluence.atlassian.com/doc/confluence-release-notes-327.html).]  You can download the latest version of Confluence Data Center & Server from the download center ([https://www.atlassian.com/software/confluence/download-archives).|https://www.atlassian.com/software/confluence/download-archives).] \n\nThis vulnerability was discovered by a private user and reported via our Bug Bounty program.",
      },
   ],
   id: "CVE-2023-22505",
   lastModified: "2024-11-21T07:44:57.220",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.3,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-18T21:15:15.583",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-88265",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-88265",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-12-19 01:15
Modified
2024-11-21 04:27
Summary
There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8E6BB7A-08EA-4B5B-9041-4A64933F233D",
                     versionEndExcluding: "6.13.10",
                     versionStartIncluding: "6.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "47031E70-1E35-427F-9489-499089F4E8B4",
                     versionEndExcluding: "6.15.10",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2DDF811-196E-4711-B8ED-2169DC2EFB17",
                     versionEndExcluding: "7.0.5",
                     versionStartIncluding: "7.0.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9695D285-429A-4236-B3B8-FDF60D86BF2C",
                     versionEndExcluding: "7.1.2",
                     versionStartIncluding: "7.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information.",
      },
      {
         lang: "es",
         value: "Había una vulnerabilidad de tipo man-in-the-middle (MITM) presente en el plugin Confluence Previews en Confluence Server y Confluence Data Center. Este plugin se utilizó para facilitar la comunicación con la aplicación Atlassian Companion. El plugin Confluence Previews en Confluence Server y Confluence Data Center se comunicó con la aplicación Companion por medio del nombre de dominio atlassian-domain-for-localhost-connections-only.com, cuyo registro DNS A señala en versión 127.0.0.1. Además, un certificado firmado para el dominio se distribuyó públicamente con la aplicación Companion. Un atacante en posición de controlar la resolución DNS de su víctima podría llevar a cabo un ataque de tipo man-in-the-middle (MITM) entre Confluence Server (o Confluence Data Center) y el dominio atlassian-domain-for-localhost-connections-only.com destinado a ser utilizado con la aplicación Companion. Este certificado ha sido revocado, sin embargo, el uso del nombre de dominio atlassian-domain-for-localhost-connections-only.com todavía estaba presente en Confluence Server y Confluence Data Center. Un atacante podría realizar el ataque descrito mediante la negación a sus víctimas del acceso a la información de revocación de certificados, y llevar a cabo un ataque de tipo man-in-the-middle (MITM) para observar los archivos que están siendo editados usando la aplicación Companion y/o modificarlos, y acceder a alguna Información del usuario limitada.",
      },
   ],
   id: "CVE-2019-15006",
   lastModified: "2024-11-21T04:27:51.607",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 4.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-12-19T01:15:10.600",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-59244",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Dec/36",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://twitter.com/SwiftOnSecurity/status/1202034106495832067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-59244",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Dec/36",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://twitter.com/SwiftOnSecurity/status/1202034106495832067",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-913",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-03-19 17:15
Modified
2025-02-12 01:28
Summary
This High severity Path Traversal vulnerability was introduced in version 6.13.0 of Confluence Data Center. This Path Traversal vulnerability, with a CVSS Score of 8.3, allows an unauthenticated attacker to exploit an undefinable vulnerability which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Data Center Atlassian recommends that Confluence Data Center customers upgrade to the latest version and that Confluence Server customers upgrade to the latest 8.5.x LTS version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was reported via our Bug Bounty program.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3610D21-039C-44BC-A7B7-C811A8B63C66",
                     versionEndExcluding: "7.19.20",
                     versionStartIncluding: "6.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C6BCADE-F919-4383-9590-657B55FC2038",
                     versionEndExcluding: "8.5.7",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "940C0A51-20D3-4A2B-B7CB-D3510BC39BFD",
                     versionEndExcluding: "8.8.1",
                     versionStartIncluding: "8.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "504EF14C-2CBF-44F7-8E32-C8DB686767CE",
                     versionEndExcluding: "7.19.20",
                     versionStartIncluding: "6.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "95D064BC-D0CA-45E4-96EA-D0A5CE3631CD",
                     versionEndExcluding: "8.5.7",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This High severity Path Traversal vulnerability was introduced in version 6.13.0 of Confluence Data Center. This Path Traversal vulnerability, with a CVSS Score of 8.3, allows an unauthenticated attacker to exploit an undefinable vulnerability which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Data Center Atlassian recommends that Confluence Data Center customers upgrade to the latest version and that Confluence Server customers upgrade to the latest 8.5.x LTS version.\n\nIf you are unable to do so, upgrade your instance to one of the specified supported fixed versions See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html\n\nYou can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. \n\nThis vulnerability was reported via our Bug Bounty program.",
      },
      {
         lang: "es",
         value: "Esta vulnerabilidad de Path Traversal de alta gravedad se introdujo en la versión 6.13.0 de Confluence Data Center. Esta vulnerabilidad Path Traversal, con una puntuación CVSS de 8.3, permite a un atacante no autenticado explotar una vulnerabilidad indefinible que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, un alto impacto en la disponibilidad y requiere la interacción del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la última versión; si no puede hacerlo, actualice su instancia a una de las versiones fijas admitidas especificadas: Data Center Atlassian recomienda que los clientes de Confluence Data Center actualicen a la última versión y que Los clientes de Confluence Server actualizan a la última versión 8.5.x LTS. Si no puede hacerlo, actualice su instancia a una de las versiones fijas compatibles especificadas. Consulte las notas de la versión https://confluence.atlassian.com/doc/confluence-release-notes-327.html. Puede descargar la última versión de Confluence Data Center y Server desde el centro de descargas https://www.atlassian.com/software/confluence/download-archives. Esta vulnerabilidad se informó a través de nuestro programa Bug Bounty.",
      },
   ],
   id: "CVE-2024-21677",
   lastModified: "2025-02-12T01:28:42.197",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.6,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-03-19T17:15:09.837",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1369444862",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-94604",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1369444862",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-94604",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-05-07 06:15
Modified
2025-02-12 21:15
Summary
Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3F6A37A-FEAB-4482-84BF-B030A8ACB6DA",
                     versionEndExcluding: "7.11.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CD864C5-92AF-4E6F-9264-31E7F4226436",
                     versionEndExcluding: "7.11.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.",
      },
      {
         lang: "es",
         value: "Unas versiones afectadas de Team Calendar en Confluence Server anteriores a 7.11.0, permiten a atacantes inyectar HTML o Javascript arbitrario por medio de una vulnerabilidad de tipo Cross Site Scripting en parámetros de configuración global de administración",
      },
   ],
   id: "CVE-2020-29444",
   lastModified: "2025-02-12T21:15:09.907",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2021-05-07T06:15:09.040",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-61266",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-61266",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-12-06 05:15
Modified
2024-11-21 07:44
Summary
This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A015179-59B5-4D96-9052-09DB29D0916C",
                     versionEndExcluding: "7.19.17",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AA7D282-A8E0-489F-84C1-C6E408A9B4ED",
                     versionEndExcluding: "8.4.5",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "083AB6F4-E31A-42A8-ADFD-78EC9707C2E3",
                     versionEndExcluding: "8.5.4",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D48F8516-17B8-4389-937F-3F9F739F6D0F",
                     versionEndExcluding: "8.6.2",
                     versionStartIncluding: "8.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:8.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED19C83-6D8B-45B1-AAC3-F4C6B12C0E4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3807D8DA-9B6B-4BC9-BDAA-ADA323D01BF6",
                     versionEndExcluding: "7.19.17",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DAC707F-D5C9-45F8-AB03-2978D4D918E8",
                     versionEndExcluding: "8.4.5",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1272EBF-A45E-42A7-A71B-401DF806E38D",
                     versionEndExcluding: "8.5.4",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details\n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.",
      },
      {
         lang: "es",
         value: "Esta vulnerabilidad de inyección de plantilla permite a un atacante autenticado, incluido uno con acceso anónimo, inyectar entradas de usuario no seguras en una página de Confluence. Con este enfoque, un atacante puede lograr la ejecución remota de código (RCE) en una instancia afectada. Las versiones de acceso público de Confluence Data Center and Server que se enumeran a continuación están en riesgo y requieren atención inmediata. Consulte el aviso para obtener detalles adicionales. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a través de un dominio atlassian.net, está alojado en Atlassian y no es vulnerable a este problema.",
      },
   ],
   id: "CVE-2023-22522",
   lastModified: "2024-11-21T07:44:58.503",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.2,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-12-06T05:15:09.587",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1319570362",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-93502",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1319570362",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-93502",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-74",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-05-22 15:55
Modified
2024-11-21 01:39
Severity ?
Summary
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
References
cve@mitre.orghttp://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17Patch, Vendor Advisory
cve@mitre.orghttp://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17Patch, Vendor Advisory
cve@mitre.orghttp://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17Patch, Vendor Advisory
cve@mitre.orghttp://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17Patch, Vendor Advisory
cve@mitre.orghttp://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17Patch, Vendor Advisory
cve@mitre.orghttp://osvdb.org/81993Broken Link
cve@mitre.orghttp://secunia.com/advisories/49146Not Applicable
cve@mitre.orghttp://www.securityfocus.com/bid/53595Third Party Advisory, VDB Entry
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/75682Third Party Advisory, VDB Entry
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/75697Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/81993Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49146Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/53595Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/75682Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/75697Third Party Advisory, VDB Entry



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C1EA6F7-CF4A-43C8-AD67-4A3E97D7B0BC",
                     versionEndExcluding: "3.3.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B53F201-032F-4672-A271-8D424B939775",
                     versionEndExcluding: "3.4.5",
                     versionStartIncluding: "3.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4059F4D-831C-467C-91BC-B49BB7A5487E",
                     versionEndExcluding: "3.5.16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9718C5D3-364A-4BD0-B60D-5FCEA8B1BAFF",
                     versionEndExcluding: "4.0.7",
                     versionStartIncluding: "4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "121D6C9B-9746-423C-9A0A-13697F7B490B",
                     versionEndExcluding: "4.1.10",
                     versionStartIncluding: "4.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB8E3563-1CF4-4665-8CD3-CAEFFBB6B3B6",
                     versionEndExcluding: "2.0.9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "55437340-1D44-41C7-B82A-6E6473C17B62",
                     versionEndExcluding: "2.1.2",
                     versionStartIncluding: "2.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68C5F90D-1AB3-409E-9A84-8EF42735BCD9",
                     versionEndExcluding: "2.2.9",
                     versionStartIncluding: "2.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C99026A0-1B4A-4CF7-B7E5-DC1231302CEC",
                     versionEndExcluding: "2.3.7",
                     versionStartIncluding: "2.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "28E820F2-4E46-4744-9EE9-C9CDEF78B8D7",
                     versionEndExcluding: "2.4.1",
                     versionStartIncluding: "2.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD4C65C4-2C22-48F2-B4F6-D40915374FF1",
                     versionEndExcluding: "2.5.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "263668EC-0168-4FC2-82E3-6606269AE372",
                     versionEndExcluding: "2.6.8",
                     versionStartIncluding: "2.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B62B11D8-BC78-431B-91D4-F6CE14E0C7D0",
                     versionEndExcluding: "2.7.12",
                     versionStartIncluding: "2.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "77B117D3-9D05-4192-9A40-B4610D636DE7",
                     versionEndExcluding: "2.5.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3768A3A7-B5F8-46C7-A932-1C779C167216",
                     versionEndExcluding: "2.6.8",
                     versionStartIncluding: "2.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4779A8F0-9CDB-46F7-9EB6-B155187218EB",
                     versionEndExcluding: "2.7.12",
                     versionStartIncluding: "2.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20F692D8-2A86-403D-82C6-363C9798BD3A",
                     versionEndExcluding: "5.0.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
      },
      {
         lang: "es",
         value: "Atlassian JIRA antes de v5.0.1; Confluence antes de v3.5.16, v4.0 antes de v4.0.7, y v4.1 antes del v4.1.10; 'FishEye and Crucible' antes de v2.5.8, v2.6 antes de v2.6.8, y v2.7 antes de v2.7.12; Bamboo antes de v3.3.4 y v3.4.x antes de v3.4.5, y Crowd antes de v2.0.9, v2.1 antes de v2.1.2, v2.2 antes de v2.2.9, v2.3 antes de v2.3.7 y v2.4 antes de v2.4.1 no restringen correctamente las capacidades de los analizadores XML de de terceros, lo que permite leer ficheros de su elección o causar una denegación de servicio (por excesivo consumo de recursos) a atacantes remotos a través de vectores no especificados.",
      },
   ],
   id: "CVE-2012-2926",
   lastModified: "2024-11-21T01:39:57.133",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.1,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2012-05-22T15:55:02.853",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/81993",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/49146",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/53595",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/81993",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/49146",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/53595",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-08-29 15:15
Modified
2024-11-21 04:42
Summary
There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05936908-961E-4BED-84F8-43EBC82428FC",
                     versionEndExcluding: "6.6.16",
                     versionStartIncluding: "6.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CA41EB3-96B9-490A-9624-576150354543",
                     versionEndExcluding: "6.13.7",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C074617C-5D55-47C8-8AB6-B3497ADA9EC4",
                     versionEndExcluding: "6.15.8",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.",
      },
      {
         lang: "es",
         value: "Hay  una vulnerabilidad de divulgación de archivos locales en Confluence Server y Confluence Data Center por medio de la exportación de página. Un atacante con permiso para editar una página puede explotar este problema para leer archivos arbitrarios en el servidor bajo el directorio (install-directory)/confluence/WEB-INF, que puede contener archivos de configuración utilizados para integrarse con otros servicios, que podrían potencialmente filtrar credenciales u otra información confidencial como credenciales de LDAP. La credencial de LDAP será filtrada potencialmente solo si el servidor Confluence está configurado para usar LDAP como repositorio de usuarios. Todas las versiones de Confluence Server desde 6.1.0 anteriores a 6.6.16 (la versión corregida para 6.6.x), desde versiones 6.7.0 anteriores a 6.13.7 (la versión corregida para 6.13.x) y desde versiones 6.14.0 anteriores a 6.15.8 (la versión corregida para 6.15.x) están afectadas por esta vulnerabilidad.",
      },
   ],
   id: "CVE-2019-3394",
   lastModified: "2024-11-21T04:42:01.373",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-08-29T15:15:11.027",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/x/uAsvOg",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-58734",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/x/uAsvOg",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-58734",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-04-01 19:15
Modified
2024-11-21 05:55
Summary
The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9AAFFA9-E8EC-4F83-B38B-2B0A8C04DD59",
                     versionEndExcluding: "5.8.6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DE645E0-3780-4919-AE6F-ECFA55F3E3F6",
                     versionEndExcluding: "5.8.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.",
      },
      {
         lang: "es",
         value: "El plugin WidgetConnector en Confluence Server y Confluence Data Center anterior a versión 5.8.6, permitía a atacantes remotos manipular el contenido de los recursos de la red interna a través de una vulnerabilidad de tipo Server-Side Request Forgery (SSRF) ciega del servidor.",
      },
   ],
   id: "CVE-2021-26072",
   lastModified: "2024-11-21T05:55:48.897",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-04-01T19:15:13.623",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-61399",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-61399",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-918",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-07-16 20:15
Modified
2025-02-13 17:09
Summary
This High severity Stored XSS vulnerability was introduced in versions 7.13 of Confluence Data Center and Server. This Stored XSS vulnerability, with a CVSS Score of 7.3, allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives). This vulnerability was reported via our Bug Bounty program.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF356AF1-3073-4277-9D8D-073EE828B871",
                     versionEndExcluding: "7.19.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0CB3601-761D-43F8-B66C-55054BBAFF3E",
                     versionEndExcluding: "8.5.9",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3F27384-4809-4FBD-B816-D99F0249C451",
                     versionEndExcluding: "8.9.1",
                     versionStartIncluding: "8.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "66B02E56-D3EB-4B72-BD50-AB248E6DD7A3",
                     versionEndExcluding: "7.19.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "753291B2-629C-4E1C-8026-9189E7A85213",
                     versionEndExcluding: "8.5.9",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This High severity Stored XSS vulnerability was introduced in versions 7.13 of Confluence Data Center and Server.\n\nThis Stored XSS vulnerability, with a CVSS Score of 7.3, allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).\n\nThis vulnerability was reported via our Bug Bounty program.",
      },
      {
         lang: "es",
         value: "Esta vulnerabilidad XSS almacenado de alta gravedad se introdujo en las versiones 7.13 de Confluence Data Center y Server. Esta vulnerabilidad XSS almacenado, con una puntuación CVSS de 7,3, permite a un atacante autenticado ejecutar código HTML o JavaScript arbitrario en el navegador de una víctima, lo que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, ningún impacto en la disponibilidad y requiere la interacción del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la última versión; si no puede hacerlo, actualice su instancia a una de las versiones correctoras admitidas especificadas que se enumeran en este CVE. Consulte las notas de la versión (https://confluence.atlassian.es/doc/confluence-release-notes-327.html). Puede descargar la última versión de Confluence Data Center and Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives). Esta vulnerabilidad fue reportada a través de nuestro programa Bug Bounty.",
      },
   ],
   id: "CVE-2024-21686",
   lastModified: "2025-02-13T17:09:31.977",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.1,
            impactScore: 5.2,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.7,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 5.8,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-07-16T20:15:02.900",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-96134",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-96134",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-16 05:15
Modified
2025-02-09 20:50
Severity ?
Summary
A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.



{
   cisaActionDue: "2024-02-14",
   cisaExploitAdd: "2024-01-24",
   cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
   cisaVulnerabilityName: "Atlassian Confluence Data Center and Server Template Injection Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "98686E6C-5D52-4EDB-A580-CE01009BADBA",
                     versionEndExcluding: "8.5.4",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:8.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FED19C83-6D8B-45B1-AAC3-F4C6B12C0E4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82C2F4B6-A251-4D8B-8624-99079E50E331",
                     versionEndExcluding: "8.5.4",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.",
      },
      {
         lang: "es",
         value: "Resumen de vulnerabilidad. Una vulnerabilidad de inyección de plantilla en versiones anteriores de Confluence Data Center y Server permite que un atacante no autenticado logre RCE en una instancia afectada. Los clientes que utilicen una versión afectada deben tomar medidas inmediatas. Las versiones compatibles más recientes de Confluence Data Center y Server no se ven afectadas por esta vulnerabilidad, ya que finalmente se mitigó durante las actualizaciones periódicas de la versión. Sin embargo, Atlassian recomienda que los clientes tengan cuidado de instalar la última versión para proteger sus instancias de vulnerabilidades no críticas descritas en el Boletín de seguridad de enero de Atlassian. Consulte “What You Need to Do” para obtener instrucciones detalladas. {panel:bgColor=#deebff} Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a través de un dominio atlassian.net, está alojado en Atlassian y no es vulnerable a este problema. {panel} Versiones afectadas ||Producto||Versiones afectadas|| |Centro de datos y servidor de Confluence| 8.0.x 8.1.x 8.2.x 8.3.x 8.4.x 8.5.0 8.5.1 8.5.2 8.5.3| Versiones fijas ||Producto||Versiones fijas|| |Centro de datos y servidor de Confluence|8.5.4 (LTS)| |Centro de datos de Confluence| 8.6.0 o posterior (solo centro de datos) 8.7.1 o posterior (solo centro de datos)| Qué debe hacer inmediatamente parchear a una versión fija Atlassian recomienda parchear cada una de sus instalaciones afectadas a la última versión. Las versiones fijas enumeradas ya no son las versiones más actualizadas y no protegen su instancia de otras vulnerabilidades no críticas, como se describe en el Boletín de seguridad de enero de Atlassian. ||Producto||Versiones fijas||Últimas versiones|| |Centro de datos y servidor de Confluence| 8.5.4 (LTS)| 8.5.5 (LTS) |Centro de datos de Confluence| 8.6.0 o posterior (solo centro de datos) 8.7.1 o posterior (solo centro de datos)| 8.6.3 o posterior (solo centro de datos) 8.7.2 o posterior (solo centro de datos) Para obtener detalles adicionales, consulte el aviso completo.",
      },
   ],
   id: "CVE-2023-22527",
   lastModified: "2025-02-09T20:50:17.667",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-16T05:15:08.290",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-93833",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-93833",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "https://www.vicarius.io/vsociety/posts/pwning-confluence-via-ognl-injection-for-fun-and-learning-cve-2023-22527",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-74",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-74",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-07-24 07:15
Modified
2024-11-21 05:02
Summary
Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "60534B6D-6A27-4CAB-8F23-D93E57E8B620",
                     versionEndExcluding: "7.4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE69336-BFD5-45FA-B75A-20825681431C",
                     versionEndExcluding: "7.5.2",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F56F6524-0ACE-4C53-8E45-60D8A3342504",
                     versionEndExcluding: "7.4.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "61C961A4-6ACA-4FAE-8FC1-BC4CA32E5346",
                     versionEndExcluding: "7.5.2",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.",
      },
      {
         lang: "es",
         value: "Las versiones afectadas de Atlassian Confluence Server y Data Center, permiten a atacantes remotos inyectar HTML o JavaScript arbitrario por medio de una vulnerabilidad de tipo Cross-Site Scripting (XSS) en los parámetros de macro de usuario. Las versiones afectadas son las versiones anteriores a  7.4.2 y desde la versión 7.5.0 anteriores a 7.5.2",
      },
   ],
   id: "CVE-2020-14175",
   lastModified: "2024-11-21T05:02:48.083",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-07-24T07:15:14.410",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-60102",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-60102",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2012-05-22 15:55
Modified
2024-11-21 01:39
Severity ?
Summary
The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "704F51BA-F57D-472A-8EE1-C379707862D1",
                     versionEndIncluding: "3.7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "070964FD-C020-4FE3-8CCA-636BFA61097C",
                     versionEndIncluding: "5.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "704F51BA-F57D-472A-8EE1-C379707862D1",
                     versionEndIncluding: "3.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ED8E5BF-B56C-41DE-9D69-E162A5E3583D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C454A6FA-38A6-4D7C-BF0B-11AF44A149DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "628EF8B6-C02C-4E29-B211-A0BE32E07A02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "502FC1F6-DAD8-43D7-8284-FA069043BB1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "116447B6-9A17-4CB0-8A09-217E0091E455",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "426AA696-27C6-4F96-95E8-A321846EBBA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8592BF3C-4775-412D-9EAE-F9E9383E266A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA4EE594-46BB-4776-B59D-188D4A9A2FB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B50AA29-33EA-4F80-828F-DCF78FEE96B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:2.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "497CA254-4BAA-439C-BF86-0F2EE436C446",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7E1978F-8C30-4253-9086-D439FCFCEC86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A31ADDF1-50C9-49B2-B4DF-9AF105CD0D31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76A0BC1-7992-46A9-A840-6A35EB8EB465",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9B9559A-0EA1-4D5B-9192-51920E38C42B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8113F2E-24C7-4885-B15B-5348E1EF6544",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F72A3B15-5609-4A4F-A22C-196D9E627CE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "35AF35E4-4E1E-4541-B21C-92E7D25D97E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "889DEB85-F871-42B5-8D4E-C523012166DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "36E8862D-C197-409D-9267-421443C818A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A94733F8-8546-4A65-BD1E-AC4E96FFA72B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "346A151B-0325-4147-B447-D6714B0DA9AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6DDC9C9-E46A-4938-8A84-BF3C2B599753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A32FE9D-3DD1-45A3-A4DA-B139FC4C9E16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "19C3CD54-D9E6-4728-89BD-DD7B24999B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:gliffy:gliffy:3.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "988E035E-3DCA-4FBF-BDBF-73E3E76B6ED2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:4.1.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AE43247-03FB-47DE-B1AE-0B269CAFE973",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
      },
      {
         lang: "es",
         value: "El complemento Gliffy para Atlassian JIRA v3.7.1, y en version anteriores ala v4.2 para Atlassian Confluence, no restringe correctamente las capacidades de los analizadores XML de tercer nivel, lo que permite leer ficheros de su elección o causar una denegación de servicio (por excesivo consumo de recursos) a atacantes remotos a través de vectores no especificados.\r\n",
      },
   ],
   id: "CVE-2012-2928",
   lastModified: "2024-11-21T01:39:57.573",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2012-05-22T15:55:02.947",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/81993",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/49166",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/53595",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mitigation",
            "Vendor Advisory",
         ],
         url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://osvdb.org/81993",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/49166",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/53595",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-20 18:15
Modified
2024-11-21 06:53
Summary
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
References
security@atlassian.comhttps://jira.atlassian.com/browse/BAM-21795Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/BSERV-13370Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/CONFSERVER-79476Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/CRUC-8541Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/CWD-5815Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/FE-7410Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/JRASERVER-73897Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/JSDSERVER-11863Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/BAM-21795Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/BSERV-13370Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CONFSERVER-79476Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CRUC-8541Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CWD-5815Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/FE-7410Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/JRASERVER-73897Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/JSDSERVER-11863Issue Tracking, Patch, Vendor Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "218C960A-04C6-4242-BEBA-C81CF5F1F722",
                     versionEndExcluding: "7.2.10",
                     versionStartIncluding: "7.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E360CDE0-FD1E-4337-8268-DB89CF605EE0",
                     versionEndExcluding: "8.0.9",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0913EE0-2046-4E7E-966D-DC894E34D12B",
                     versionEndExcluding: "8.1.8",
                     versionStartIncluding: "8.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D182C1B1-A5FF-4777-9835-4E9114BB68DC",
                     versionEndExcluding: "8.2.4",
                     versionStartIncluding: "8.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DCD53E4-3169-4E8A-88D1-38BE51D09DD3",
                     versionEndExcluding: "7.6.16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B878E40-95A7-40A7-9C52-6BC0C2FD3F54",
                     versionEndExcluding: "7.17.8",
                     versionStartIncluding: "7.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "46305D5A-7F7B-4A04-9DAD-E582D1193A7E",
                     versionEndExcluding: "7.19.5",
                     versionStartIncluding: "7.18.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A96B135B-9272-457E-A557-6566554262D3",
                     versionEndExcluding: "7.20.2",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "62956861-BEDE-40C8-B628-C831087E7BDB",
                     versionEndExcluding: "7.21.2",
                     versionStartIncluding: "7.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A85565F-3F80-4E00-A706-AB4B2EAA4AFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "99E2E3C0-CDF0-4D79-80A6-85E71B947ED9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C543CA6-8E8A-476C-AB27-614DF4EC68A5",
                     versionEndExcluding: "7.4.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "45FD913B-45DE-4CA8-9733-D62F54B19E74",
                     versionEndExcluding: "7.13.7",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "12E753EB-0D31-448B-B8DE-0A95434CC97C",
                     versionEndExcluding: "7.14.3",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE114494-74F0-454C-AAC4-8B8E5F1C67D0",
                     versionEndExcluding: "7.15.2",
                     versionStartIncluding: "7.15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "90BB3572-29ED-415F-AD34-00EB76271F9C",
                     versionEndExcluding: "7.16.4",
                     versionStartIncluding: "7.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30EF756A-B4E9-4E5D-BE6F-02CE95F12C9C",
                     versionEndExcluding: "7.17.4",
                     versionStartIncluding: "7.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A56B6A10-E23F-49EF-8C07-1AEDFCAE2788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE8BE634-1599-4790-9410-6CA43BC60C4D",
                     versionEndExcluding: "7.4.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "52E68DFD-48F5-4949-AFEA-3829CA5DFC04",
                     versionEndExcluding: "7.13.7",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DCDEC6C-4515-4CAA-9D82-7BF68A3AAE7E",
                     versionEndExcluding: "7.14.3",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9948F94-DF67-4E3C-8CD4-417D57FBC60F",
                     versionEndExcluding: "7.15.2",
                     versionStartIncluding: "7.15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30E63ECB-85A8-4D41-A9B5-9FFF18D9CDB1",
                     versionEndExcluding: "7.16.4",
                     versionStartIncluding: "7.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "694171BD-FAE2-472C-8183-04BCA2F7B9A7",
                     versionEndExcluding: "7.17.4",
                     versionStartIncluding: "7.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AC5E81B-DA4B-45E7-9584-4B576E49FD8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE028964-B3FC-4883-9967-68DE46EE7F6F",
                     versionEndExcluding: "4.3.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "57DC9E2A-4C89-420D-9330-F11E56BF2F83",
                     versionEndExcluding: "4.4.2",
                     versionStartIncluding: "4.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C50A718F-C67B-4462-BB7E-F80408DEF07D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "92329A2E-13E8-4818-85AB-3E7F479411EF",
                     versionEndExcluding: "4.8.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30DDE751-CA88-4CFB-9E60-4243851B4B53",
                     versionEndExcluding: "4.8.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D91B8507-A7A7-4B74-9999-F1DEA9F487A9",
                     versionEndExcluding: "8.13.22",
                     versionStartIncluding: "8.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "963AE427-2897-42CB-AE11-654D700E690B",
                     versionEndExcluding: "8.20.10",
                     versionStartIncluding: "8.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7CD8891-BB97-4AD3-BEE4-6CCA0D8A2D85",
                     versionEndExcluding: "8.22.4",
                     versionStartIncluding: "8.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E73A5202-6114-48E6-8F9B-C03B2E707055",
                     versionEndExcluding: "8.13.22",
                     versionStartIncluding: "8.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D22AB11D-1D73-45DC-803C-146EFED18CDA",
                     versionEndExcluding: "8.20.10",
                     versionStartIncluding: "8.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB2091E9-0B14-4786-852F-454C56D20839",
                     versionEndExcluding: "8.22.4",
                     versionStartIncluding: "8.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:data_center:*:*:*",
                     matchCriteriaId: "1451C219-8AAA-4165-AE2C-033EF7B6F93A",
                     versionEndExcluding: "4.13.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:server:*:*:*",
                     matchCriteriaId: "BD23F987-0F14-4938-BB51-4EE61C24EB62",
                     versionEndExcluding: "4.13.22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",
                     matchCriteriaId: "39F77953-41D7-4398-9F07-2A057A993762",
                     versionEndExcluding: "4.20.10",
                     versionStartIncluding: "4.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*",
                     matchCriteriaId: "CADBE0E7-36D9-4F6F-BEE6-A1E0B9428C2A",
                     versionEndExcluding: "4.20.10",
                     versionStartIncluding: "4.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",
                     matchCriteriaId: "DC0DB08B-2034-4691-A7B2-3E5F8B6318B1",
                     versionEndExcluding: "4.22.4",
                     versionStartIncluding: "4.21.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*",
                     matchCriteriaId: "97A17BE7-7CCC-46D8-A317-53E2B026DF6E",
                     versionEndExcluding: "4.22.4",
                     versionStartIncluding: "4.21.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad en varios productos de Atlassian permite a un atacante remoto no autenticado omitir los filtros Servlet usados por aplicaciones de primera y tercera parte. El impacto depende de los filtros usados por cada aplicación y de cómo son usados los filtros. Esta vulnerabilidad puede resultar en una omisión de la autenticación y un ataque de tipo cross-site scripting. Atlassian ha publicado actualizaciones que corrigen la causa principal de esta vulnerabilidad, pero no ha enumerado exhaustivamente todas las consecuencias potenciales de esta vulnerabilidad. Están afectadas las versiones de Atlassian Bamboo anteriores a 8.0.9, desde 8.1.0 hasta  8.1.8, y desde la 8.2.0 hasta 8.2.4. Las versiones de Atlassian Bitbucket están afectadas anteriores a 7.6.16, desde la 7.7.0 anteriores a 7.17.8, desde la 7.18.0 anteriores a 7.19.5, desde la 7.20.0 anteriores a 7.20.2, desde la 7.21.0 anteriores a 7.21.2, y las versiones 8.0.0 y 8.1.0. Están afectadas las versiones de Atlassian Confluence anteriores a 7.4.17, desde la 7.5.0 anteriores a 7.13.7, desde la 7.14.0 anteriores a 7.14.3, desde la 7.15.0 anteriores a 7.15.2, desde la 7.16.0 anteriores a 7.16.4, desde la 7.17.0 anteriores a 7.17.4 y la versión 7.21.0. Están afectadas las versiones de Atlassian Crowd anteriores a 4.3.8, desde la 4.4.0 hasta 4.4.2, y la versión 5.0.0. Están afectadas las versiones de Atlassian Fisheye y Crucible anteriores a 4.8.10. Están afectadas las versiones de Atlassian Jira anteriores a 8.13.22, desde la 8.14.0 hasta 8.20.10, y desde la 8.21.0 hasta 8.22.4. Las versiones de Atlassian Jira Service Management están afectadas anteriores a 4.13.22, desde la 4.14.0 anteriores a 4.20.10, y desde la 4.21.0 anteriores a 4.22.4",
      },
   ],
   id: "CVE-2022-26136",
   lastModified: "2024-11-21T06:53:30.297",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2022-07-20T18:15:08.487",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/BAM-21795",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/BSERV-13370",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CRUC-8541",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CWD-5815",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/FE-7410",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JRASERVER-73897",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/BAM-21795",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/BSERV-13370",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CRUC-8541",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CWD-5815",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/FE-7410",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JRASERVER-73897",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-180",
            },
         ],
         source: "security@atlassian.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-02-15 04:15
Modified
2024-11-21 06:30
Summary
Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. This vulnerability only affects installations of Confluence Server and Data Center on Windows. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83557716-7A48-48D5-85A9-4A29DBF4F511",
                     versionEndExcluding: "7.4.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A310D77-1FFF-4FFE-AD50-75DFF973EB3F",
                     versionEndExcluding: "7.12.3",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BA04112-3B97-491B-93E6-80C444274430",
                     versionEndExcluding: "7.4.10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1148DF0-42C0-435F-A6EB-EFA93E10E8D7",
                     versionEndExcluding: "7.12.3",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. This vulnerability only affects installations of Confluence Server and Data Center on Windows. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.",
      },
      {
         lang: "es",
         value: "Las versiones afectadas de Atlassian Confluence Server y Data Center permiten a los atacantes locales autentificados conseguir privilegios elevados en el sistema local a través de una vulnerabilidad de DLL Hijacking en el instalador de Confluence. Esta vulnerabilidad sólo afecta a las instalaciones de Confluence Server y Data Center en Windows. Las versiones afectadas son anteriores a la versión 7.4.10, y desde la versión 7.5.0 hasta la versión7.12.3",
      },
   ],
   id: "CVE-2021-43940",
   lastModified: "2024-11-21T06:30:02.713",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 6.9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2022-02-15T04:15:07.177",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-66550",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-66550",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "security@atlassian.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-427",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-01 17:15
Modified
2024-11-21 07:44
Summary
Affected versions of Atlassian Confluence Server and Data Center allow anonymous remote attackers to view the names of attachments and labels in a private Confluence space. This occurs via an Information Disclosure vulnerability in the macro preview feature. This vulnerability was reported by Rojan Rijal of the Tinder Security Engineering team. The affected versions are before version 7.13.15, from version 7.14.0 before 7.19.7, and from version 7.20.0 before 8.2.0.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACD9E451-29B3-4D59-88E5-9AAB52C64B29",
                     versionEndExcluding: "7.13.15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6EA4793-BF98-4C48-9B80-90487A33B8C2",
                     versionEndExcluding: "7.19.7",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D5FBFE8-F97B-4E6B-B6AB-7EF9955B66BA",
                     versionEndExcluding: "8.2.0",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A9A23C3-4831-4882-9786-F63F8990206C",
                     versionEndExcluding: "7.13.15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9F35096-F530-45EA-827F-56537235CCE3",
                     versionEndExcluding: "7.19.7",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBBB9EBB-FFFA-4AE8-BA5A-D06D6D9A309E",
                     versionEndExcluding: "8.2.0",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Atlassian Confluence Server and Data Center allow anonymous remote attackers to view the names of attachments and labels in a private Confluence space. This occurs via an Information Disclosure vulnerability in the macro preview feature.\r\n\r\nThis vulnerability was reported by Rojan Rijal of the Tinder Security Engineering team.\r\n\r\nThe affected versions are before version 7.13.15, from version 7.14.0 before 7.19.7, and from version 7.20.0 before 8.2.0.",
      },
   ],
   id: "CVE-2023-22503",
   lastModified: "2024-11-21T07:44:56.947",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-05-01T17:15:08.993",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-82403",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-82403",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-01-16 05:15
Modified
2024-11-21 08:54
Summary
This High severity Remote Code Execution (RCE) vulnerability was introduced in version 7.13.0 of Confluence Data Center and Server. Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.6 and a CVSS Vector of CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, no impact to integrity, no impact to availability, and does not require user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release * Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release * Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6315A65C-D63C-4A23-BD87-4CCE7FA41662",
                     versionEndExcluding: "7.19.18",
                     versionStartIncluding: "7.19.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5910506D-FE53-411D-8684-C5477CE44D48",
                     versionEndExcluding: "8.5.5",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30B5862B-E498-44C3-8C73-8474AEA4108D",
                     versionEndExcluding: "8.7.2",
                     versionStartIncluding: "8.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE863B2C-1277-400C-B9A6-9A7895DEDD8C",
                     versionEndExcluding: "7.19.18",
                     versionStartIncluding: "7.19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42A7385-4CBB-4EE3-B227-13CD02C50D8A",
                     versionEndExcluding: "8.5.5",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F31DE4-0A6B-4183-8E74-324DA2BF2BD1",
                     versionEndIncluding: "8.7.2",
                     versionStartIncluding: "8.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This High severity Remote Code Execution (RCE) vulnerability was introduced in version 7.13.0 of Confluence Data Center and Server.\n\nRemote Code Execution (RCE) vulnerability, with a CVSS Score of 8.6 and a CVSS Vector of CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, no impact to integrity, no impact to availability, and does not require user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release\n* Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release\n* Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).",
      },
      {
         lang: "es",
         value: "Esta vulnerabilidad de ejecución remota de código (RCE) de alta gravedad se introdujo en la versión 7.13.0 de Confluence Data Center and Server. Vulnerabilidad de ejecución remota de código (RCE), con una puntuación CVSS de 8,6 y un vector CVSS de CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N /A:N permite que un atacante no autenticado exponga activos en su entorno susceptibles de explotación, lo que tiene un alto impacto en la confidencialidad, ningún impacto en la integridad, ningún impacto en la disponibilidad y no requiere interacción del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la última versión; si no puede hacerlo, actualice su instancia a una de las versiones fijas admitidas especificadas: * Confluence Data Center y Server 7.19: actualice a una versión 7.19.18, o cualquier versión superior 7.19.x * Confluence Data Center y Server 8.5: actualice a una versión 8.5.5 o cualquier versión superior 8.5.x * Confluence Data Center y Server 8.7: actualice a una versión 8.7.2 o cualquier versión superior Consulte la notas de la versión (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). Puede descargar la última versión de Confluence Data Center and Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives).",
      },
   ],
   id: "CVE-2024-21674",
   lastModified: "2024-11-21T08:54:50.740",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 4,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-01-16T05:15:08.910",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-94066",
      },
      {
         source: "nvd@nist.gov",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/security/security-bulletin-january-16-2024-1333335615.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-94066",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-07-18 23:15
Modified
2024-11-21 07:44
Summary
This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22508 was introduced in version 6.1.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to avoid this bug using the following options: * Upgrade to a Confluence feature release greater than or equal to 8.2.0 (ie: 8.2, 8.2, 8.4, etc...) * Upgrade to a Confluence 7.19 LTS bugfix release greater than or equal to 7.19.8 (ie: 7.19.8, 7.19.9, 7.19.10, 7.19.11, etc...) * Upgrade to a Confluence 7.13 LTS bugfix release greater than or equal to 7.13.20 (Release available early August) See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Data Center & Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). If you are unable to upgrade your instance please use the following guide to workaround the issue https://confluence.atlassian.com/confkb/how-to-disable-the-jmx-network-port-for-cve-2023-22508-1267761550.html This vulnerability was discovered by a private user and reported via our Bug Bounty program.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "406C37DD-9A78-4BC3-B91B-C649B75DDC21",
                     versionEndExcluding: "7.13.20",
                     versionStartIncluding: "6.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBD124AD-097C-4F5C-978A-6070A539F220",
                     versionEndExcluding: "7.19.8",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D5FBFE8-F97B-4E6B-B6AB-7EF9955B66BA",
                     versionEndExcluding: "8.2.0",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E4CB719-B825-4ED0-B783-EF8DE9E1B5EE",
                     versionEndExcluding: "7.13.20",
                     versionStartIncluding: "6.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CE5A04D-2133-4E27-951F-C5F6BAB044AF",
                     versionEndExcluding: "7.19.8",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBBB9EBB-FFFA-4AE8-BA5A-D06D6D9A309E",
                     versionEndExcluding: "8.2.0",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22508 was introduced in version 6.1.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to avoid this bug using the following options: * Upgrade to a Confluence feature release greater than or equal to 8.2.0 (ie: 8.2, 8.2, 8.4, etc...) * Upgrade to a Confluence 7.19 LTS bugfix release greater than or equal to 7.19.8 (ie: 7.19.8, 7.19.9, 7.19.10, 7.19.11, etc...) * Upgrade to a Confluence 7.13 LTS bugfix release greater than or equal to 7.13.20 (Release available early August) See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Data Center & Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). If you are unable to upgrade your instance please use the following guide to workaround the issue https://confluence.atlassian.com/confkb/how-to-disable-the-jmx-network-port-for-cve-2023-22508-1267761550.html This vulnerability was discovered by a private user and reported via our Bug Bounty program.",
      },
      {
         lang: "es",
         value: "Esta vulnerabilidad RCE (ejecución remota de código) de alta gravedad conocida como CVE-2023-22508 se introdujo en la versión 6.1.0 de Confluence Data Center &amp; Server. Esta vulnerabilidad RCE (ejecución remota de código), con una puntuación CVSS de 8.5, permite a un atacante autenticado ejecutar código arbitrario que tiene un alto impacto en la confidencialidad, un alto impacto en la integridad, un alto impacto en la disponibilidad y ninguna interacción del usuario. Atlassian recomienda actualizar su instancia para evitar este error utilizando las siguientes opciones: * Actualizar a una versión de función de Confluence mayor o igual a 8.2.0 (es decir, 8.2, 8.2, 8.4, etc...) * Actualizar a una versión de corrección de errores de Confluence 7.19 LTS mayor o igual a 7.19.8 (es decir: 7.19.8, 7.19.9, 7.19.10, 7.19.11, etc.) * Actualice a una versión de corrección de errores Confluence 7.13 LTS mayor o igual a 13.7.20 (Lanzamiento disponible a principios de agosto) Consulte las notas de la versión (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). Puede descargar la última versión de Data Center &amp; Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives). Si no puede actualizar su instancia, utilice la siguiente guía para solucionar el problema https://confluence.atlassian.com/confkb/how-to-disable-the-jmx-network-port-for-cve-2023-22508-1267761550.html Esta vulnerabilidad fue descubierta por un usuario privado y reportada a través de nuestro programa Bug Bounty.",
      },
   ],
   id: "CVE-2023-22508",
   lastModified: "2024-11-21T07:44:57.507",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-07-18T23:15:09.297",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-88221",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-88221",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-04-05 04:15
Modified
2024-11-21 06:18
Summary
Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A28735F-4827-4410-8B0B-C209ECD21DFC",
                     versionEndExcluding: "6.13.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA5224DF-97AB-4D8E-B66D-FC65A1333531",
                     versionEndExcluding: "7.4.11",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E776BF66-74F1-4D8E-9099-42A4E5EEE300",
                     versionEndExcluding: "7.11.6",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11303D6-258F-4FAC-A868-BF506E7F5A4E",
                     versionEndExcluding: "7.12.5",
                     versionStartIncluding: "7.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D1FF67F-3FB4-4C0C-8263-3D4CA00A02CD",
                     versionEndExcluding: "6.13.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5CCD4D0-6BC7-442A-9D4D-43841FE40F3E",
                     versionEndExcluding: "7.4.11",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF59072C-9911-4035-A75A-27D882988919",
                     versionEndExcluding: "7.11.6",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFEE2534-EBEF-438B-B616-ED4FFBC9246E",
                     versionEndExcluding: "7.12.5",
                     versionStartIncluding: "7.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.",
      },
      {
         lang: "es",
         value: "Las versiones afectadas de Atlassian Confluence Server y Data Center permiten a los usuarios con una cuenta válida en una instancia de Confluence Data Center ejecutar código Java arbitrario o ejecutar comandos del sistema arbitrarios mediante la inyección de una carga útil OGNL. Las versiones afectadas son las versiones anteriores a 6.13.23, desde la versión 6.14.0 hasta la 7.4.11, desde la versión 7.5.0 hasta la 7.11.6 y desde la versión 7.12.0 hasta la 7.12.5",
      },
   ],
   id: "CVE-2021-39114",
   lastModified: "2024-11-21T06:18:36.020",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2022-04-05T04:15:08.707",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-68844",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Third Party Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-68844",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-03-25 19:29
Modified
2025-02-10 18:56
Summary
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.



{
   cisaActionDue: "2022-05-03",
   cisaExploitAdd: "2021-11-03",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Atlassian Confluence Server and Data Center Server-Side Template Injection Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE0A6BCA-F10E-4CFD-B740-AEAC08A6A5A8",
                     versionEndExcluding: "6.6.12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2253D975-8194-437C-958A-55ECF152E0AC",
                     versionEndExcluding: "6.12.3",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "675FE700-8FDB-44DD-9C8E-82DE7CB8BE1C",
                     versionEndExcluding: "6.13.3",
                     versionStartIncluding: "6.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68B7D049-4672-4914-A6BC-A311FC617128",
                     versionEndExcluding: "6.14.2",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.",
      },
      {
         lang: "es",
         value: "La macro de Widget Connector en Atlassian Confluence and Data Center en versiones anteriores a la 6.6.12 (la versión solucionada para 6.6.x), desde la versión 6.7.0 hasta antes de la 6.12.3 (la versión solucionada para 6.12.x), desde la versión 6.13.0 hasta antes de la 6.13.3 (la versión solucionada para 6.13.x) y desde la versión 6.14.0 hasta antes de la 6.14.2 (la versión solucionada para 6.14.x) permite a los atacantes remotos lograr saltos de directorio y ejecución remota de código en una instancia de Confluence Server or Data Center a través de una inyección de plantillas del lado del servidor.",
      },
   ],
   id: "CVE-2019-3396",
   lastModified: "2025-02-10T18:56:33.027",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2019-03-25T19:29:01.647",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-57974",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://www.exploit-db.com/exploits/46731/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-57974",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "https://www.exploit-db.com/exploits/46731/",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-07-26 04:15
Modified
2024-11-21 05:29
Summary
The Livesearch macro in Confluence Server and Data Center before version 7.4.5, from version 7.5.0 before 7.6.3, and from version 7.7.0 before version 7.7.4 allows remote attackers with permission to edit a page or blog to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the page excerpt functionality.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF09E479-BBC9-45B9-99DE-A01870FF78DD",
                     versionEndExcluding: "7.4.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "54135B7E-36BD-40D3-B467-347EBD55C475",
                     versionEndExcluding: "7.6.3",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "12398549-8D95-4E23-AB62-04AB87C0CBEF",
                     versionEndExcluding: "7.7.4",
                     versionStartIncluding: "7.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05AE6F85-D165-4211-B3B7-B21598777249",
                     versionEndExcluding: "7.4.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "04129939-2C7D-4E36-91DE-8FFB3D2DDB54",
                     versionEndExcluding: "7.6.3",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A83C45FA-5DB0-4953-815C-67D161C99946",
                     versionEndExcluding: "7.7.4",
                     versionStartIncluding: "7.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Livesearch macro in Confluence Server and Data Center before version 7.4.5, from version 7.5.0 before 7.6.3, and from version 7.7.0 before version 7.7.4 allows remote attackers with permission to edit a page or blog to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the page excerpt functionality.",
      },
      {
         lang: "es",
         value: "Livesearch macro in Confluence Server and Data Center versiones anteriores a 7.4.5, desde versión 7.5.0 anteriores a 7.6.3, y desde versión 7.7.0 anteriores a 7.7.4, permite a atacantes remotos con permiso para editar una página o blog inyectar HTML o JavaScript arbitrario por medio de una vulnerabilidad de tipo cross site scripting (XSS) en la funcionalidad page excerpt.",
      },
   ],
   id: "CVE-2020-36290",
   lastModified: "2024-11-21T05:29:13.573",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-07-26T04:15:11.070",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-60118",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-60118",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-02-13 18:29
Modified
2024-11-21 04:01
Summary
Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF2CCA37-B9C8-46C3-B839-25F287BFE635",
                     versionEndExcluding: "6.13.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "281F6F1E-E4D1-436F-928E-535816C24954",
                     versionEndExcluding: "6.14.0",
                     versionStartIncluding: "6.13.2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5F58782-D4F6-46BC-BFBC-187372FEB8DB",
                     versionEndExcluding: "6.13.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "81398F6D-D05D-4B06-945C-7B429D11A839",
                     versionEndExcluding: "6.14.0",
                     versionStartIncluding: "6.13.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.",
      },
      {
         lang: "es",
         value: "Atlassian Confluence Server and Data Center, en versiones anteriores a la 6.13.1, permite que un usuario autenticado descargue una página eliminada mediante la característica de exportación de palabras.",
      },
   ],
   id: "CVE-2018-20237",
   lastModified: "2024-11-21T04:01:08.627",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-02-13T18:29:00.667",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/107041",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-57814",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/107041",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-57814",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-668",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-05-25 14:15
Modified
2024-11-21 07:44
Summary
Affected versions of Atlassian Confluence Server allow remote attackers who have read permissions to a page, but not write permissions, to upload attachments via a Broken Access Control vulnerability in the attachments feature.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8212B49-7444-4BC1-8E9D-4FAFE64CA1B5",
                     versionEndExcluding: "7.13.17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A47ECCB-A5BC-4160-95CB-4A4C33F3215E",
                     versionEndExcluding: "7.19.9",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4DA184-99BE-4408-BEC9-2B584F6BF1C4",
                     versionEndExcluding: "8.2.2",
                     versionStartIncluding: "7.20.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Affected versions of Atlassian Confluence Server allow remote attackers who have read permissions to a page, but not write permissions, to upload attachments via a Broken Access Control vulnerability in the attachments feature.",
      },
   ],
   id: "CVE-2023-22504",
   lastModified: "2024-11-21T07:44:57.087",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-05-25T14:15:09.877",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-83218",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-83218",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-434",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-08-30 07:15
Modified
2025-02-10 18:02
Summary
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.



{
   cisaActionDue: "2021-11-17",
   cisaExploitAdd: "2021-11-03",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Atlassian Confluence Server and Data Center Object-Graph Navigation Language (OGNL) Injection Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A28735F-4827-4410-8B0B-C209ECD21DFC",
                     versionEndExcluding: "6.13.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA5224DF-97AB-4D8E-B66D-FC65A1333531",
                     versionEndExcluding: "7.4.11",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E776BF66-74F1-4D8E-9099-42A4E5EEE300",
                     versionEndExcluding: "7.11.6",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E11303D6-258F-4FAC-A868-BF506E7F5A4E",
                     versionEndExcluding: "7.12.5",
                     versionStartIncluding: "7.12.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D1FF67F-3FB4-4C0C-8263-3D4CA00A02CD",
                     versionEndExcluding: "6.13.23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5CCD4D0-6BC7-442A-9D4D-43841FE40F3E",
                     versionEndExcluding: "7.4.11",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF59072C-9911-4035-A75A-27D882988919",
                     versionEndExcluding: "7.11.6",
                     versionStartIncluding: "7.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFEE2534-EBEF-438B-B616-ED4FFBC9246E",
                     versionEndExcluding: "7.12.5",
                     versionStartIncluding: "7.12.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.",
      },
      {
         lang: "es",
         value: "En las versiones afectadas de Confluence Server y Data Center, se presenta una vulnerabilidad de inyección OGNL que permitiría a un usuario no autenticado ejecutar código arbitrario en una instancia de Confluence Server o Data Center. Las versiones afectadas son las versiones anteriores a 6.13.23, desde versiones 6.14.0 anteriores a 7.4.11, desde versiones 7.5.0 anteriores a 7.11.6 y desde versiones 7.12.0 anteriores a 7.12.5.",
      },
   ],
   id: "CVE-2021-26084",
   lastModified: "2025-02-10T18:02:37.233",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2021-08-30T07:15:06.587",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-67940",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-67940",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-917",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-917",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-06-03 22:15
Modified
2025-02-09 20:48
Summary
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
References
security@atlassian.comhttp://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.htmlExploit, Third Party Advisory, VDB Entry
security@atlassian.comhttp://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.htmlThird Party Advisory, VDB Entry
security@atlassian.comhttp://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.htmlThird Party Advisory, VDB Entry
security@atlassian.comhttp://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.htmlExploit, Third Party Advisory, VDB Entry
security@atlassian.comhttps://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.htmlVendor Advisory
security@atlassian.comhttps://jira.atlassian.com/browse/CONFSERVER-79016Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CONFSERVER-79016Issue Tracking, Patch, Vendor Advisory



{
   cisaActionDue: "2022-06-06",
   cisaExploitAdd: "2022-06-02",
   cisaRequiredAction: "Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html] OR remove the affected products by the due date on the right. Note: Once the update is successfully deployed, agencies can reassess the internet blocking rules.",
   cisaVulnerabilityName: "Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B80A5DD-66A4-4BA9-8BE0-CD862048B497",
                     versionEndExcluding: "7.4.17",
                     versionStartIncluding: "1.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C98724BE-9503-4E81-B427-79410CDBF2B9",
                     versionEndExcluding: "7.13.7",
                     versionStartIncluding: "7.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "12E753EB-0D31-448B-B8DE-0A95434CC97C",
                     versionEndExcluding: "7.14.3",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE114494-74F0-454C-AAC4-8B8E5F1C67D0",
                     versionEndExcluding: "7.15.2",
                     versionStartIncluding: "7.15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "90BB3572-29ED-415F-AD34-00EB76271F9C",
                     versionEndExcluding: "7.16.4",
                     versionStartIncluding: "7.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30EF756A-B4E9-4E5D-BE6F-02CE95F12C9C",
                     versionEndExcluding: "7.17.4",
                     versionStartIncluding: "7.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A56B6A10-E23F-49EF-8C07-1AEDFCAE2788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AC4BC00-4067-4C75-AF15-A754C2713B02",
                     versionEndExcluding: "7.4.17",
                     versionStartIncluding: "1.3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4587786A-9864-405F-8C0F-31D930651F59",
                     versionEndExcluding: "7.13.7",
                     versionStartIncluding: "7.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DCDEC6C-4515-4CAA-9D82-7BF68A3AAE7E",
                     versionEndExcluding: "7.14.3",
                     versionStartIncluding: "7.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9948F94-DF67-4E3C-8CD4-417D57FBC60F",
                     versionEndExcluding: "7.15.2",
                     versionStartIncluding: "7.15.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "30E63ECB-85A8-4D41-A9B5-9FFF18D9CDB1",
                     versionEndExcluding: "7.16.4",
                     versionStartIncluding: "7.16.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "694171BD-FAE2-472C-8183-04BCA2F7B9A7",
                     versionEndExcluding: "7.17.4",
                     versionStartIncluding: "7.17.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AC5E81B-DA4B-45E7-9584-4B576E49FD8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.",
      },
      {
         lang: "es",
         value: "En las versiones afectadas de Confluence Server y Data Center, se presenta una vulnerabilidad de inyección OGNL que permitiría a un atacante no autenticado ejecutar código arbitrario en una instancia de Confluence Server o Data Center. Las versiones afectadas son 1.3.0 anteriores a 7.4.17, 7.13.0 anteriores a 7.13.7, 7.14.0 anteriores a 7.14.3, 7.15.0 anteriores a 7.15.2, 7.16.0 anteriores a 7.16.4, 7.17.0 anteriores a 7.17.4 y 7.18.0 anteriores a 7.18.1",
      },
   ],
   id: "CVE-2022-26134",
   lastModified: "2025-02-09T20:48:52.653",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2022-06-03T22:15:07.717",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-79016",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-79016",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-917",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-917",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-04-18 18:29
Modified
2025-02-10 18:54
Summary
Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.
References
security@atlassian.comhttp://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.htmlThird Party Advisory, VDB Entry
security@atlassian.comhttp://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.htmlExploit, Third Party Advisory, VDB Entry
security@atlassian.comhttp://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.htmlThird Party Advisory, VDB Entry
security@atlassian.comhttp://www.securityfocus.com/bid/108067Third Party Advisory, VDB Entry
security@atlassian.comhttps://jira.atlassian.com/browse/CONFSERVER-58102Issue Tracking, Patch, Vendor Advisory
security@atlassian.comhttps://seclists.org/bugtraq/2019/Apr/33Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/108067Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://jira.atlassian.com/browse/CONFSERVER-58102Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Apr/33Mailing List, Third Party Advisory



{
   cisaActionDue: "2022-05-03",
   cisaExploitAdd: "2021-11-03",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Atlassian Confluence Server and Data Center Path Traversal Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D168206-104A-4472-B80C-53C690AAD3AD",
                     versionEndExcluding: "6.6.13",
                     versionStartIncluding: "2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "913A98A6-05F2-44D3-9997-C9665B00CC1F",
                     versionEndExcluding: "6.12.4",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B8FC02E-BE73-4CA7-BCEA-41AE17B7A3DC",
                     versionEndExcluding: "6.13.4",
                     versionStartIncluding: "6.13.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0302809C-5A6C-4698-B2AE-69021A96AD67",
                     versionEndExcluding: "6.14.3",
                     versionStartIncluding: "6.14.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "21CD506C-79B6-4E96-80CC-9CC996E8E428",
                     versionEndExcluding: "6.15.2",
                     versionStartIncluding: "6.15.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.",
      },
      {
         lang: "es",
         value: "El Confluence Server and Data Center tenían una vulnerabilidad de salto de ruta en el recurso downloadallattachments. Un atacante remoto que tenga permiso para agregar archivos adjuntos a páginas y/o blogs o para crear un nuevo espacio o un espacio personal o quien tenga permisos 'Admin' para un espacio poder explotar esta vulnerabilidad de salto de ruta para escribir archivos en ubicaciones arbitrarias que pueden conducir a la ejecución de código remota en sistemas que ejecutan en una versión vulnerable de Confluence Server o Data Center. Todas las versiones de Confluence Server versión desde 2.0.0 anterior a 6.6.13 (la versión fija para 6.6.x), versión desde 6.7.0 anterior a 6.12.4 (la versión fija para 6.12.x), versión  desde 6.13.0 anterior a 6.13.4 ( la versión fija para 6.13.x), versión desde 6.14.0 anterior a 6.14.3 (la versión fija para 6.14.x), y versión desde 6.15.0 anterior a 6.15.2 se ven afectados por esta vulnerabilidad.",
      },
   ],
   id: "CVE-2019-3398",
   lastModified: "2025-02-10T18:54:57.053",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "COMPLETE",
               baseScore: 9,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2019-04-18T18:29:00.970",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/108067",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-58102",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Apr/33",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/108067",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-58102",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Apr/33",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-22",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-05-13 14:55
Modified
2024-11-21 01:46
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in logout.action in Atlassian Confluence 3.4.6 allows remote attackers to hijack the authentication of administrators for requests that logout the user via a comment.
Impacted products
Vendor Product Version
atlassian confluence_server 3.4.6



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:3.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "35F82B71-158C-40A0-AEE0-DA1444EC55D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cross-site request forgery (CSRF) vulnerability in logout.action in Atlassian Confluence 3.4.6 allows remote attackers to hijack the authentication of administrators for requests that logout the user via a comment.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de tipo cross-site request forgery (CSRF) en logout.action en Confluence versión 3.4.6 de Atlassian, permite a los atacantes remotos secuestrar la autenticación de administradores para las peticiones que cierran la sesión del usuario por medio de un comentario.",
      },
   ],
   id: "CVE-2012-6342",
   lastModified: "2024-11-21T01:46:02.563",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
   },
   published: "2014-05-13T14:55:08.563",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2013-01/0066.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/524217/30/450/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-22784",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2013-01/0066.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/524217/30/450/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-22784",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-352",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-04 14:15
Modified
2025-02-09 20:49
Summary
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.



{
   cisaActionDue: "2023-10-13",
   cisaExploitAdd: "2023-10-05",
   cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.",
   cisaVulnerabilityName: "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85B2AD9F-CBA6-4559-9AE3-5F76A9EC3B7F",
                     versionEndExcluding: "8.3.3",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "38F9918D-6848-4CD6-8096-4FB48C23818B",
                     versionEndExcluding: "8.4.3",
                     versionStartIncluding: "8.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D646BCF-214F-449D-AEEB-B253E8715394",
                     versionEndExcluding: "8.5.2",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "970A3DA7-5114-4696-A93D-C3D5AFF5C6C5",
                     versionEndExcluding: "8.3.3",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2EB19CD-AE29-4775-91C5-05B01A96AC6C",
                     versionEndExcluding: "8.4.3",
                     versionStartIncluding: "8.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "79229BE7-0AA0-4308-8BB2-8FB11E8B9AD7",
                     versionEndExcluding: "8.5.2",
                     versionStartIncluding: "8.5.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. ",
      },
      {
         lang: "es",
         value: "Atlassian ha sido informado de un problema informado por un puñado de clientes en el que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center and Server de acceso público para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a través de un dominio atlassian.net, está alojado en Atlassian y no es vulnerable a este problema.",
      },
   ],
   id: "CVE-2023-22515",
   lastModified: "2025-02-09T20:49:55.073",
   metrics: {
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "security@atlassian.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2023-10-04T14:15:10.440",
   references: [
      {
         source: "security@atlassian.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276",
      },
      {
         source: "security@atlassian.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-92475",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://jira.atlassian.com/browse/CONFSERVER-92475",
      },
   ],
   sourceIdentifier: "security@atlassian.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}

cve-2017-7415
Vulnerability from cvelistv5
Published
2017-04-27 10:00
Modified
2024-08-05 16:04
Severity ?
Summary
Atlassian Confluence 6.x before 6.0.7 allows remote attackers to bypass authentication and read any blog or page via the drafts diff REST resource.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T16:04:11.501Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-52222",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html",
               },
               {
                  name: "97961",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/97961",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2017-04-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Atlassian Confluence 6.x before 6.0.7 allows remote attackers to bypass authentication and read any blog or page via the drafts diff REST resource.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-04-27T09:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-52222",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html",
            },
            {
               name: "97961",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/97961",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2017-7415",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Atlassian Confluence 6.x before 6.0.7 allows remote attackers to bypass authentication and read any blog or page via the drafts diff REST resource.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-52222",
                     refsource: "CONFIRM",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-52222",
                  },
                  {
                     name: "https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html",
                     refsource: "CONFIRM",
                     url: "https://packetstormsecurity.com/files/142330/Confluence-6.0.x-Information-Disclosure.html",
                  },
                  {
                     name: "97961",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/97961",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2017-7415",
      datePublished: "2017-04-27T10:00:00",
      dateReserved: "2017-04-04T00:00:00",
      dateUpdated: "2024-08-05T16:04:11.501Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21672
Vulnerability from cvelistv5
Published
2024-01-16 05:00
Modified
2024-08-01 22:27
Summary
This High severity Remote Code Execution (RCE) vulnerability was introduced in version 2.1.0 of Confluence Data Center and Server. Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.3 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H allows an unauthenticated attacker to remotely expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release * Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release * Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: >= 7.19.0
Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.6.0
Version: >= 8.7.1
Create a notification for this product.
   Atlassian Confluence Server Version: >= 7.19.0
Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.6.0
Version: >= 8.7.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:35.887Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-94064",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.7.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.18",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.5",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.7.2",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.7.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.18",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.5",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "DDV_UA",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "This High severity Remote Code Execution (RCE) vulnerability was introduced in version 2.1.0 of Confluence Data Center and Server.\n\nRemote Code Execution (RCE) vulnerability, with a CVSS Score of 8.3 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H allows an unauthenticated attacker to remotely expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release\n* Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release\n* Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 8.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RCE (Remote Code Execution)",
                     lang: "en",
                     type: "RCE (Remote Code Execution)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-17T01:00:01.127Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-94064",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2024-21672",
      datePublished: "2024-01-16T05:00:00.703Z",
      dateReserved: "2024-01-01T00:05:33.845Z",
      dateUpdated: "2024-08-01T22:27:35.887Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2012-2928
Vulnerability from cvelistv5
Published
2012-05-22 15:00
Modified
2024-08-06 19:50
Severity ?
Summary
The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T19:50:05.070Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "49166",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49166",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
               },
               {
                  name: "81993",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/81993",
               },
               {
                  name: "53595",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/53595",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
               },
               {
                  name: "jira-xml-dos(75697)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-05-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "49166",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49166",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
            },
            {
               name: "81993",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/81993",
            },
            {
               name: "53595",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/53595",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
            },
            {
               name: "jira-xml-dos(75697)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2012-2928",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Gliffy plugin before 3.7.1 for Atlassian JIRA, and before 4.2 for Atlassian Confluence, does not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "49166",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/49166",
                  },
                  {
                     name: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
                     refsource: "CONFIRM",
                     url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
                  },
                  {
                     name: "81993",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/81993",
                  },
                  {
                     name: "53595",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/53595",
                  },
                  {
                     name: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
                     refsource: "CONFIRM",
                     url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
                  },
                  {
                     name: "jira-xml-dos(75697)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2012-2928",
      datePublished: "2012-05-22T15:00:00",
      dateReserved: "2012-05-22T00:00:00",
      dateUpdated: "2024-08-06T19:50:05.070Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-3394
Vulnerability from cvelistv5
Published
2019-08-29 14:32
Modified
2024-09-17 00:02
Severity ?
Summary
There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: 6.1.0   < unspecified
Version: unspecified   < 6.6.16
Version: 6.7.0   < unspecified
Version: unspecified   < 6.13.7
Version: 6.14.0   < unspecified
Version: unspecified   < 6.15.8
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:12:09.337Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-58734",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/x/uAsvOg",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.1.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.6.16",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.13.7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.15.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-08-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Path Traversal",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-09-03T14:33:34",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-58734",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://confluence.atlassian.com/x/uAsvOg",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2019-08-28T10:00:00",
               ID: "CVE-2019-3394",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">=",
                                          version_value: "6.1.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.6.16",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.7.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.7",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.15.8",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Path Traversal",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-58734",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-58734",
                  },
                  {
                     name: "https://confluence.atlassian.com/x/uAsvOg",
                     refsource: "MISC",
                     url: "https://confluence.atlassian.com/x/uAsvOg",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2019-3394",
      datePublished: "2019-08-29T14:32:32.947868Z",
      dateReserved: "2018-12-19T00:00:00",
      dateUpdated: "2024-09-17T00:02:29.665Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22504
Vulnerability from cvelistv5
Published
2023-05-25 14:00
Modified
2024-10-01 15:23
Summary
Affected versions of Atlassian Confluence Server allow remote attackers who have read permissions to a page, but not write permissions, to upload attachments via a Broken Access Control vulnerability in the attachments feature.
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: >= 1.1.2
Version: >= 7.14.0
Version: >= 7.20.0
Create a notification for this product.
   Atlassian Confluence Server Version: >= 1.1.2
Version: >= 7.14.0
Version: >= 7.20.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:13:48.544Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-83218",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22504",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-01T15:23:16.949639Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-01T15:23:29.330Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 1.1.2",
                  },
                  {
                     status: "affected",
                     version: ">= 1.1.2",
                  },
                  {
                     status: "affected",
                     version: ">= 7.14.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.20.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.13.7",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.9",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.2.2",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.3.0",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 1.1.2",
                  },
                  {
                     status: "affected",
                     version: ">= 1.1.2",
                  },
                  {
                     status: "affected",
                     version: ">= 7.14.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.20.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.13.7",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.9",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.2.2",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.3.0",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "This vulnerability was discovered by Rojan Rijal of the Tinder Security Engineering Team.",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Atlassian Confluence Server allow remote attackers who have read permissions to a page, but not write permissions, to upload attachments via a Broken Access Control vulnerability in the attachments feature.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Improper Authorization",
                     lang: "en",
                     type: "Improper Authorization",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-07T14:00:01.151Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-83218",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22504",
      datePublished: "2023-05-25T14:00:02.234Z",
      dateReserved: "2023-01-01T00:01:22.329Z",
      dateUpdated: "2024-10-01T15:23:29.330Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-26138
Vulnerability from cvelistv5
Published
2022-07-20 17:25
Modified
2025-01-28 21:48
Severity ?
Summary
The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.
Impacted products
Vendor Product Version
Atlassian Questions For Confluence Version: 2.7.34
Version: 2.7.35
Version: 3.0.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:56:37.662Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-79483",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-07-20-1142446709.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-26138",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-28T21:47:41.648320Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2022-07-29",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-26138",
                     },
                     type: "kev",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-28T21:48:56.674Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Questions For Confluence",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "affected",
                     version: "2.7.34",
                  },
                  {
                     status: "affected",
                     version: "2.7.35",
                  },
                  {
                     status: "affected",
                     version: "3.0.2",
                  },
               ],
            },
         ],
         datePublic: "2022-07-20T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-798",
                     description: "Use of Hard-coded Credentials (CWE-798)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-20T17:25:26.000Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-79483",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-07-20-1142446709.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2022-07-20T00:00:00",
               ID: "CVE-2022-26138",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Questions For Confluence",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_value: "2.7.34",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "2.7.35",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "3.0.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Use of Hard-coded Credentials (CWE-798)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-79483",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-79483",
                  },
                  {
                     name: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-07-20-1142446709.html",
                     refsource: "MISC",
                     url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-07-20-1142446709.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2022-26138",
      datePublished: "2022-07-20T17:25:26.913Z",
      dateReserved: "2022-02-25T00:00:00.000Z",
      dateUpdated: "2025-01-28T21:48:56.674Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-20406
Vulnerability from cvelistv5
Published
2020-02-06 03:10
Modified
2024-09-16 23:21
Severity ?
Summary
The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.
References
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: unspecified   < 7.0.5
Version: 7.1.0   < unspecified
Version: unspecified   < 7.1.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:39:09.888Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-59428",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.0.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.1.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.1.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2020-02-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DLL Hijacking",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-06T03:10:28",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-59428",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2020-02-05T00:00:00",
               ID: "CVE-2019-20406",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.0.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.1.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.1.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DLL Hijacking",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-59428",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-59428",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2019-20406",
      datePublished: "2020-02-06T03:10:28.891775Z",
      dateReserved: "2020-01-23T00:00:00",
      dateUpdated: "2024-09-16T23:21:49.035Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-26137
Vulnerability from cvelistv5
Published
2022-07-20 17:25
Modified
2024-10-03 17:10
Summary
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
Impacted products
Vendor Product Version
Atlassian Bamboo Server Version: unspecified   < 8.0.9
Version: 8.1.0   < unspecified
Version: unspecified   < 8.1.8
Version: 8.2.0   < unspecified
Version: unspecified   < 8.2.4
Create a notification for this product.
   Atlassian Bamboo Data Center Version: unspecified   < 8.0.9
Version: 8.1.0   < unspecified
Version: unspecified   < 8.1.8
Version: 8.2.0   < unspecified
Version: unspecified   < 8.2.4
Create a notification for this product.
   Atlassian Bitbucket Server Version: unspecified   < 7.6.16
Version: 7.7.0   < unspecified
Version: 7.16.0   < unspecified
Version: unspecified   < 7.17.8
Version: 7.18.0   < unspecified
Version: unspecified   < 7.19.5
Version: 7.20.0   < unspecified
Version: unspecified   < 7.20.2
Version: 7.21.0   < unspecified
Version: unspecified   < 7.21.2
Version: 8.0.0
Version: 8.1.0
Create a notification for this product.
   Atlassian Bitbucket Data Center Version: unspecified   < 7.6.16
Version: 7.7.0   < unspecified
Version: 7.16.0   < unspecified
Version: unspecified   < 7.17.8
Version: 7.18.0   < unspecified
Version: unspecified   < 7.19.5
Version: 7.20.0   < unspecified
Version: unspecified   < 7.20.2
Version: 7.21.0   < unspecified
Version: unspecified   < 7.21.2
Version: 8.0.0
Version: 8.1.0
Create a notification for this product.
   Atlassian Confluence Server Version: unspecified   < 7.4.17
Version: 7.5.0   < unspecified
Version: unspecified   < 7.13.7
Version: 7.14.0   < unspecified
Version: unspecified   < 7.14.3
Version: 7.15.0   < unspecified
Version: unspecified   < 7.15.2
Version: 7.16.0   < unspecified
Version: unspecified   < 7.16.4
Version: 7.17.0   < unspecified
Version: unspecified   < 7.17.4
Version: 7.18.0
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 7.4.17
Version: 7.5.0   < unspecified
Version: unspecified   < 7.13.7
Version: 7.14.0   < unspecified
Version: unspecified   < 7.14.3
Version: 7.15.0   < unspecified
Version: unspecified   < 7.15.2
Version: 7.16.0   < unspecified
Version: unspecified   < 7.16.4
Version: 7.17.0   < unspecified
Version: unspecified   < 7.17.4
Version: 7.18.0
Create a notification for this product.
   Atlassian Crowd Server Version: unspecified   < 4.3.8
Version: 4.4.0   < unspecified
Version: unspecified   < 4.4.2
Version: 5.0.0
Create a notification for this product.
   Atlassian Crowd Data Center Version: unspecified   < 4.3.8
Version: 4.4.0   < unspecified
Version: unspecified   < 4.4.2
Version: 5.0.0
Create a notification for this product.
   Atlassian Crucible Version: unspecified   < 4.8.10
Create a notification for this product.
   Atlassian Fisheye Version: unspecified   < 4.8.10
Create a notification for this product.
   Atlassian Jira Core Server Version: unspecified   < 8.13.22
Version: 8.14.0   < unspecified
Version: unspecified   < 8.20.10
Version: 8.21.0   < unspecified
Version: unspecified   < 8.22.4
Create a notification for this product.
   Atlassian Jira Software Server Version: unspecified   < 8.13.22
Version: 8.14.0   < unspecified
Version: unspecified   < 8.20.10
Version: 8.21.0   < unspecified
Version: unspecified   < 8.22.4
Create a notification for this product.
   Atlassian Jira Software Data Center Version: unspecified   < 8.13.22
Version: 8.14.0   < unspecified
Version: unspecified   < 8.20.10
Version: 8.21.0   < unspecified
Version: unspecified   < 8.22.4
Create a notification for this product.
   Atlassian Jira Service Management Server Version: unspecified   < 4.13.22
Version: 4.14.0   < unspecified
Version: unspecified   < 4.20.10
Version: 4.21.0   < unspecified
Version: unspecified   < 4.22.4
Create a notification for this product.
   Atlassian Jira Service Management Data Center Version: unspecified   < 4.13.22
Version: 4.14.0   < unspecified
Version: unspecified   < 4.20.10
Version: 4.21.0   < unspecified
Version: unspecified   < 4.22.4
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:56:37.614Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/BAM-21795",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/BSERV-13370",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CWD-5815",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/FE-7410",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CRUC-8541",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/JRASERVER-73897",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "bamboo",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.2.10",
                        status: "affected",
                        version: "7.2.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.0.9",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.1.8",
                        status: "affected",
                        version: "8.1.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.2.4",
                        status: "affected",
                        version: "8.2.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "bitbucket",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.6.16",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.17.8",
                        status: "affected",
                        version: "7.7.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.19.5",
                        status: "affected",
                        version: "7.18.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.20.2",
                        status: "affected",
                        version: "7.20.1",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.21.2",
                        status: "affected",
                        version: "7.21.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "bitbucket",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "8.0.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "bitbucket",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "8.1.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.4.17",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.13.7",
                        status: "affected",
                        version: "7.5.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.14.3",
                        status: "affected",
                        version: "7.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.15.2",
                        status: "affected",
                        version: "7.15.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.16.4",
                        status: "affected",
                        version: "7.16.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.17.4",
                        status: "affected",
                        version: "7.17.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "7.18.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.4.17",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.13.7",
                        status: "affected",
                        version: "7.5.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.14.3",
                        status: "affected",
                        version: "7.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.15.2",
                        status: "affected",
                        version: "7.15.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.16.4",
                        status: "affected",
                        version: "7.16.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.17.4",
                        status: "affected",
                        version: "7.17.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "7.18.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "crowd",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.3.8",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.4.2",
                        status: "affected",
                        version: "4.4.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "crowd",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "5.0.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "crucible",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.8.10",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fisheye",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.8.10",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.13.22",
                        status: "affected",
                        version: "8.13.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.20.10",
                        status: "affected",
                        version: "8.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.22.4",
                        status: "affected",
                        version: "8.21.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.13.22",
                        status: "affected",
                        version: "8.13.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.20.10",
                        status: "affected",
                        version: "8.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.22.4",
                        status: "affected",
                        version: "8.21.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:server:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_service_desk",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.13.22",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_service_desk",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.13.22",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_service_management",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.20.10",
                        status: "affected",
                        version: "4.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.22.4",
                        status: "affected",
                        version: "4.21.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_service_management",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.20.10",
                        status: "affected",
                        version: "4.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.22.4",
                        status: "affected",
                        version: "4.21.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 8.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "REQUIRED",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-26137",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-03T16:48:52.174175Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-03T17:10:16.886Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Bamboo Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.0.9",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.1.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.1.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.2.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.2.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Bamboo Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.0.9",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.1.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.1.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.2.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.2.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Bitbucket Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.6.16",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.18.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.19.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.20.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.20.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.21.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "8.0.0",
                  },
                  {
                     status: "affected",
                     version: "8.1.0",
                  },
               ],
            },
            {
               product: "Bitbucket Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.6.16",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.18.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.19.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.20.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.20.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.21.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "8.0.0",
                  },
                  {
                     status: "affected",
                     version: "8.1.0",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.17",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.13.7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.14.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.15.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.15.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.16.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.17.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "7.18.0",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.17",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.13.7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.14.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.15.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.15.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.16.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.17.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "7.18.0",
                  },
               ],
            },
            {
               product: "Crowd Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.3.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.4.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.4.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "5.0.0",
                  },
               ],
            },
            {
               product: "Crowd Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.3.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.4.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.4.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "5.0.0",
                  },
               ],
            },
            {
               product: "Crucible",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.8.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Fisheye",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.8.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Core Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Software Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Software Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Service Management Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Service Management Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-07-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-180",
                     description: "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-20T17:25:23",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/BAM-21795",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/BSERV-13370",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CWD-5815",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/FE-7410",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CRUC-8541",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/JRASERVER-73897",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2022-07-20T00:00:00",
               ID: "CVE-2022-26137",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Bamboo Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.0.9",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.1.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.1.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.2.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.2.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Bamboo Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.0.9",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.1.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.1.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.2.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.2.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Bitbucket Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.6.16",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.7.0",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.18.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.19.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.20.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.20.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.21.2",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "8.0.0",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "8.1.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Bitbucket Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.6.16",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.7.0",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.18.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.19.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.20.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.20.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.21.2",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "8.0.0",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "8.1.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.17",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.13.7",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.14.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.15.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.15.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.16.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.17.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.4",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "7.18.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.17",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.13.7",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.14.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.15.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.15.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.16.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.17.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.4",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "7.18.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Crowd Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.3.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.4.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.4.2",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "5.0.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Crowd Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.3.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.4.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.4.2",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "5.0.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Crucible",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.8.10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Fisheye",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.8.10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Core Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.22.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Software Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.22.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Software Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.22.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Service Management Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.22.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Service Management Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.22.4",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/BAM-21795",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/BAM-21795",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/BSERV-13370",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/BSERV-13370",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-79476",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CWD-5815",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CWD-5815",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/FE-7410",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/FE-7410",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CRUC-8541",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CRUC-8541",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/JRASERVER-73897",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/JRASERVER-73897",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/JSDSERVER-11863",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2022-26137",
      datePublished: "2022-07-20T17:25:23.603830Z",
      dateReserved: "2022-02-25T00:00:00",
      dateUpdated: "2024-10-03T17:10:16.886Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22503
Vulnerability from cvelistv5
Published
2023-05-01 16:00
Modified
2024-10-01 15:22
Summary
Affected versions of Atlassian Confluence Server and Data Center allow anonymous remote attackers to view the names of attachments and labels in a private Confluence space. This occurs via an Information Disclosure vulnerability in the macro preview feature. This vulnerability was reported by Rojan Rijal of the Tinder Security Engineering team. The affected versions are before version 7.13.15, from version 7.14.0 before 7.19.7, and from version 7.20.0 before 8.2.0.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:13:48.665Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-82403",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.13.15",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.19.7",
                        status: "affected",
                        version: "7.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.2.0",
                        status: "affected",
                        version: "7.20.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.13.15",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.19.7",
                        status: "affected",
                        version: "7.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.2.0",
                        status: "affected",
                        version: "7.20.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22503",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-01T15:14:47.693093Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-200",
                        description: "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-01T15:22:41.837Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.20.2",
                  },
                  {
                     status: "affected",
                     version: ">= 7.20.2",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.13.5",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.7",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.20.0",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.20.2",
                  },
                  {
                     status: "affected",
                     version: ">= 7.20.2",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.13.5",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.7",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.20.0",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "This vulnerability was reported by Rojan Rijal of the Tinder Security Engineering team.",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Atlassian Confluence Server and Data Center allow anonymous remote attackers to view the names of attachments and labels in a private Confluence space. This occurs via an Information Disclosure vulnerability in the macro preview feature.\r\n\r\nThis vulnerability was reported by Rojan Rijal of the Tinder Security Engineering team.\r\n\r\nThe affected versions are before version 7.13.15, from version 7.14.0 before 7.19.7, and from version 7.20.0 before 8.2.0.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "Information Disclosure",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-05-01T16:00:32.509Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-82403",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22503",
      datePublished: "2023-05-01T16:00:32.509Z",
      dateReserved: "2023-01-01T00:01:22.329Z",
      dateUpdated: "2024-10-01T15:22:41.837Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21686
Vulnerability from cvelistv5
Published
2024-07-16 20:00
Modified
2024-08-07 14:53
Summary
This High severity Stored XSS vulnerability was introduced in versions 7.13 of Confluence Data Center and Server. This Stored XSS vulnerability, with a CVSS Score of 7.3, allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives). This vulnerability was reported via our Bug Bounty program.
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: 8.9.0
Version: 8.8.0 to 8.8.1
Version: 8.7.1 to 8.7.2
Version: 8.6.0 to 8.6.2
Version: 8.5.0 to 8.5.8
Version: 8.4.0 to 8.4.5
Version: 8.3.0 to 8.3.4
Version: 8.2.0 to 8.2.3
Version: 8.1.0 to 8.1.4
Version: 8.0.0 to 8.0.4
Version: 7.20.0 to 7.20.3
Version: 7.19.0 to 7.19.21
Create a notification for this product.
   Atlassian Confluence Server Version: 8.5.0 to 8.5.8
Version: 8.4.0 to 8.4.5
Version: 8.3.0 to 8.3.4
Version: 8.2.0 to 8.2.3
Version: 8.1.0 to 8.1.4
Version: 8.0.0 to 8.0.4
Version: 7.20.0 to 7.20.3
Version: 7.19.0 to 7.19.21
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:36.033Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-96134",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "8.9.0",
                     },
                     {
                        lessThanOrEqual: "8.8.1",
                        status: "affected",
                        version: "8.8.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.7.2",
                        status: "affected",
                        version: "8.7.1",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.6.2",
                        status: "affected",
                        version: "8.6.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.5.8",
                        status: "affected",
                        version: "8.5.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.4.5",
                        status: "affected",
                        version: "8.4.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.3.4",
                        status: "affected",
                        version: "8.3.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.2.3",
                        status: "affected",
                        version: "8.2.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.1.4",
                        status: "affected",
                        version: "8.1.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.0.4",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "7.20.3",
                        status: "affected",
                        version: "7.20.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "7.19.21",
                        status: "affected",
                        version: "7.19.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.9.4",
                        status: "affected",
                        version: "8.9.1",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.5.12",
                        status: "affected",
                        version: "8.5.9",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "7.19.25",
                        status: "affected",
                        version: "7.19.22",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThanOrEqual: "8.5.8",
                        status: "affected",
                        version: "8.5.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.4.5",
                        status: "affected",
                        version: "8.4.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.3.4",
                        status: "affected",
                        version: "8.3.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.2.3",
                        status: "affected",
                        version: "8.2.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.1.4",
                        status: "affected",
                        version: "8.1.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.0.4",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "7.20.3",
                        status: "affected",
                        version: "7.20.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "7.19.21",
                        status: "affected",
                        version: "7.19.0",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "8.5.12",
                        status: "affected",
                        version: "8.5.9",
                        versionType: "custom",
                     },
                     {
                        lessThanOrEqual: "7.19.25",
                        status: "affected",
                        version: "7.19.22",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21686",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-05T15:34:59.884690Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-07T14:53:10.328Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "affected",
                     version: "8.9.0",
                  },
                  {
                     status: "affected",
                     version: "8.8.0 to 8.8.1",
                  },
                  {
                     status: "affected",
                     version: "8.7.1 to 8.7.2",
                  },
                  {
                     status: "affected",
                     version: "8.6.0 to 8.6.2",
                  },
                  {
                     status: "affected",
                     version: "8.5.0 to 8.5.8",
                  },
                  {
                     status: "affected",
                     version: "8.4.0 to 8.4.5",
                  },
                  {
                     status: "affected",
                     version: "8.3.0 to 8.3.4",
                  },
                  {
                     status: "affected",
                     version: "8.2.0 to 8.2.3",
                  },
                  {
                     status: "affected",
                     version: "8.1.0 to 8.1.4",
                  },
                  {
                     status: "affected",
                     version: "8.0.0 to 8.0.4",
                  },
                  {
                     status: "affected",
                     version: "7.20.0 to 7.20.3",
                  },
                  {
                     status: "affected",
                     version: "7.19.0 to 7.19.21",
                  },
                  {
                     status: "unaffected",
                     version: "8.9.1 to 8.9.4",
                  },
                  {
                     status: "unaffected",
                     version: "8.5.9 to 8.5.12",
                  },
                  {
                     status: "unaffected",
                     version: "7.19.22 to 7.19.25",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "affected",
                     version: "8.5.0 to 8.5.8",
                  },
                  {
                     status: "affected",
                     version: "8.4.0 to 8.4.5",
                  },
                  {
                     status: "affected",
                     version: "8.3.0 to 8.3.4",
                  },
                  {
                     status: "affected",
                     version: "8.2.0 to 8.2.3",
                  },
                  {
                     status: "affected",
                     version: "8.1.0 to 8.1.4",
                  },
                  {
                     status: "affected",
                     version: "8.0.0 to 8.0.4",
                  },
                  {
                     status: "affected",
                     version: "7.20.0 to 7.20.3",
                  },
                  {
                     status: "affected",
                     version: "7.19.0 to 7.19.21",
                  },
                  {
                     status: "unaffected",
                     version: "8.5.9 to 8.5.12",
                  },
                  {
                     status: "unaffected",
                     version: "7.19.22 to 7.19.25",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "This High severity Stored XSS vulnerability was introduced in versions 7.13 of Confluence Data Center and Server.\n\nThis Stored XSS vulnerability, with a CVSS Score of 7.3, allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives).\n\nThis vulnerability was reported via our Bug Bounty program.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 7.3,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Stored XSS",
                     lang: "en",
                     type: "Stored XSS",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-07-16T20:00:02.617Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917",
            },
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-96134",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2024-21686",
      datePublished: "2024-07-16T20:00:02.156Z",
      dateReserved: "2024-01-01T00:05:33.847Z",
      dateUpdated: "2024-08-07T14:53:10.328Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-39114
Vulnerability from cvelistv5
Published
2022-04-05 04:00
Modified
2024-10-04 19:06
Summary
Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 6.13.23
Version: 6.14.0   < unspecified
Version: unspecified   < 7.4.11
Version: 7.5.0   < unspecified
Version: unspecified   < 7.11.6
Version: 7.12.0   < unspecified
Version: unspecified   < 7.12.5
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 6.13.23
Version: 6.14.0   < unspecified
Version: unspecified   < 7.4.11
Version: 7.5.0   < unspecified
Version: unspecified   < 7.11.6
Version: 7.12.0   < unspecified
Version: unspecified   < 7.12.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T01:58:17.751Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-68844",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "6.13.23",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.4.11",
                        status: "affected",
                        version: "6.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.11.6",
                        status: "affected",
                        version: "7.5.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.12.5",
                        status: "affected",
                        version: "7.12.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "6.13.23",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.4.11",
                        status: "affected",
                        version: "6.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.11.6",
                        status: "affected",
                        version: "7.5.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.12.5",
                        status: "affected",
                        version: "7.12.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 8.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2021-39114",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-04T18:55:58.863918Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-94",
                        description: "CWE-94 Improper Control of Generation of Code ('Code Injection')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-04T19:06:17.769Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.13.23",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.4.11",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.11.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.12.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.12.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.13.23",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.4.11",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.11.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.12.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.12.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-02-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-05T04:00:18",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-68844",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2022-02-09T00:00:00",
               ID: "CVE-2021-39114",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.23",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.11",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.11.6",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.12.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.12.5",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.23",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.11",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.11.6",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.12.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.12.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Remote Code Execution",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-68844",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-68844",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2021-39114",
      datePublished: "2022-04-05T04:00:18.966826Z",
      dateReserved: "2021-08-16T00:00:00",
      dateUpdated: "2024-10-04T19:06:17.769Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22505
Vulnerability from cvelistv5
Published
2023-07-18 21:00
Modified
2024-10-01 16:57
Summary
This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22505 was introduced in version 8.0.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 8.3.2, 8.4.0. See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html).|https://confluence.atlassian.com/doc/confluence-release-notes-327.html).] You can download the latest version of Confluence Data Center & Server from the download center ([https://www.atlassian.com/software/confluence/download-archives).|https://www.atlassian.com/software/confluence/download-archives).] This vulnerability was discovered by a private user and reported via our Bug Bounty program.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:13:48.555Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-88265",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.3.2",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.3.2",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22505",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-01T16:34:34.966748Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-01T16:57:28.043Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.3.2",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.4.0",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.3.2",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.4.0",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "a private user",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22505 was introduced in version 8.0.0 of Confluence Data Center & Server.\n\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.\n\nAtlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 8.3.2, 8.4.0. See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html).|https://confluence.atlassian.com/doc/confluence-release-notes-327.html).]  You can download the latest version of Confluence Data Center & Server from the download center ([https://www.atlassian.com/software/confluence/download-archives).|https://www.atlassian.com/software/confluence/download-archives).] \n\nThis vulnerability was discovered by a private user and reported via our Bug Bounty program.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RCE (Remote Code Execution)",
                     lang: "en",
                     type: "RCE (Remote Code Execution)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-18T21:00:00.968Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-88265",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22505",
      datePublished: "2023-07-18T21:00:00.968Z",
      dateReserved: "2023-01-01T00:01:22.329Z",
      dateUpdated: "2024-10-01T16:57:28.043Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22518
Vulnerability from cvelistv5
Published
2023-10-31 14:30
Modified
2025-02-13 16:43
Severity ?
Summary
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:13:48.670Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-93142",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22518",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-03T16:33:26.216427Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-11-07",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-22518",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-863",
                        description: "CWE-863 Incorrect Authorization",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-03T16:33:55.888Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 1.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 1.0.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.16",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.3.4",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.4.4",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.3",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.6.1",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 1.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 1.0.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.16",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.3.4",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.4.4",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.3",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.6.1",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "-",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. \n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Improper Authorization",
                     lang: "en",
                     type: "Improper Authorization",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-12-19T16:06:15.741Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907",
            },
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-93142",
            },
            {
               url: "http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22518",
      datePublished: "2023-10-31T14:30:00.418Z",
      dateReserved: "2023-01-01T00:01:22.332Z",
      dateUpdated: "2025-02-13T16:43:53.802Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-20102
Vulnerability from cvelistv5
Published
2020-04-22 03:30
Modified
2024-09-16 16:57
Severity ?
Summary
The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: 6.14.0   < unspecified
Version: unspecified   <
Version: 6.15.0   < unspecified
Version: unspecified   < 6.15.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T02:32:10.529Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-59358",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "6.14.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.15.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.15.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2020-04-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross Site Scripting (XSS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-04-22T03:30:14",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-59358",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2020-04-15T00:00:00",
               ID: "CVE-2019-20102",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "6.14.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.15.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.15.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross Site Scripting (XSS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-59358",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-59358",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2019-20102",
      datePublished: "2020-04-22T03:30:15.017973Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-16T16:57:45.935Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26084
Vulnerability from cvelistv5
Published
2021-08-30 06:30
Modified
2025-02-04 14:48
Severity ?
Summary
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 6.13.23
Version: 6.14.0   < unspecified
Version: unspecified   < 7.4.11
Version: 7.5.0   < unspecified
Version: unspecified   < 7.11.6
Version: 7.12.0   < unspecified
Version: unspecified   < 7.12.5
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 6.13.23
Version: 6.14.0   < unspecified
Version: unspecified   < 7.4.11
Version: 7.5.0   < unspecified
Version: unspecified   < 7.11.6
Version: 7.12.0   < unspecified
Version: unspecified   < 7.12.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:19:19.592Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-67940",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2021-26084",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-04T14:48:31.680086Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2021-11-03",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-26084",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-917",
                        description: "CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-04T14:48:39.312Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.13.23",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.4.11",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.11.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.12.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.12.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.13.23",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.4.11",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.11.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.12.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.12.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-08-10T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-08T17:06:12.000Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-67940",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2021-08-10T00:00:00",
               ID: "CVE-2021-26084",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.23",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.11",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.11.6",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.12.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.12.5",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.23",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.11",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.11.6",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.12.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.12.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Remote Code Execution",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-67940",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-67940",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2021-26084",
      datePublished: "2021-08-30T06:30:14.248Z",
      dateReserved: "2021-01-25T00:00:00.000Z",
      dateUpdated: "2025-02-04T14:48:39.312Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22527
Vulnerability from cvelistv5
Published
2024-01-16 05:00
Modified
2025-02-13 16:43
Severity ?
Summary
A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action. Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.5.1
Version: >= 8.5.2
Version: >= 8.5.3
Create a notification for this product.
   Atlassian Confluence Server Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.5.1
Version: >= 8.5.2
Version: >= 8.5.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:8.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.5.4",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:8.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.5.4",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-22527",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-02-14T05:00:58.661097Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2024-01-24",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-22527",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-74",
                        description: "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:26:49.981Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            timeline: [
               {
                  lang: "en",
                  time: "2024-01-24T00:00:00+00:00",
                  value: "CVE-2023-22527 added to CISA KEV",
               },
            ],
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-19T07:47:54.708Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-93833",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html",
               },
               {
                  url: "https://www.vicarius.io/vsociety/posts/pwning-confluence-via-ognl-injection-for-fun-and-learning-cve-2023-22527",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.3",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.4",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.7.1",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.3",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.4",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.6.0",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Petrus Viet",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RCE (Remote Code Execution)",
                     lang: "en",
                     type: "RCE (Remote Code Execution)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-26T17:06:21.681Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615",
            },
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-93833",
            },
            {
               url: "http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22527",
      datePublished: "2024-01-16T05:00:00.692Z",
      dateReserved: "2023-01-01T00:01:22.333Z",
      dateUpdated: "2025-02-13T16:43:54.355Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-29448
Vulnerability from cvelistv5
Published
2021-02-18 15:08
Modified
2024-09-17 02:31
Severity ?
Summary
The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 6.13.18
Version: 6.14.0   < unspecified
Version: unspecified   < 7.4.6
Version: 7.5.0   < unspecified
Version: unspecified   < 7.8.3
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 6.13.18
Version: 6.14.0   < unspecified
Version: unspecified   < 7.4.6
Version: 7.5.0   < unspecified
Version: unspecified   < 7.8.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:55:09.777Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-60469",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.13.18",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.4.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.8.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.13.18",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.4.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.8.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2020-11-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Arbitrary File Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-02-18T15:08:59",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-60469",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2020-11-10T12:03:00",
               ID: "CVE-2020-29448",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.18",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.6",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.8.3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.18",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.6",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.8.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Arbitrary File Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-60469",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-60469",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2020-29448",
      datePublished: "2021-02-18T15:08:59.028136Z",
      dateReserved: "2020-12-01T00:00:00",
      dateUpdated: "2024-09-17T02:31:11.206Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-20237
Vulnerability from cvelistv5
Published
2019-02-13 18:00
Modified
2024-09-16 21:02
Severity ?
Summary
Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 6.13.1
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 6.13.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T11:58:18.553Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-57814",
               },
               {
                  name: "107041",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/107041",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.13.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.13.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-02-07T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Indirect Object Reference",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-09T19:07:04",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-57814",
            },
            {
               name: "107041",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/107041",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2019-02-07T00:00:00",
               ID: "CVE-2018-20237",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Indirect Object Reference",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-57814",
                     refsource: "CONFIRM",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-57814",
                  },
                  {
                     name: "107041",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/107041",
                  },
                  {
                     name: "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/",
                     refsource: "MISC",
                     url: "https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2018-20237",
      datePublished: "2019-02-13T18:00:00Z",
      dateReserved: "2018-12-19T00:00:00",
      dateUpdated: "2024-09-16T21:02:16.888Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2012-6342
Vulnerability from cvelistv5
Published
2014-05-13 14:00
Modified
2024-08-06 21:28
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in logout.action in Atlassian Confluence 3.4.6 allows remote attackers to hijack the authentication of administrators for requests that logout the user via a comment.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T21:28:39.357Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20130116 Re: [CVE-ID REQUEST] Atlassian Confluence - Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2013-01/0066.html",
               },
               {
                  name: "20120920 [CVE-ID REQUEST] Atlassian Confluence - Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/524217/30/450/threaded",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-22784",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-09-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cross-site request forgery (CSRF) vulnerability in logout.action in Atlassian Confluence 3.4.6 allows remote attackers to hijack the authentication of administrators for requests that logout the user via a comment.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-23T14:45:40",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20130116 Re: [CVE-ID REQUEST] Atlassian Confluence - Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2013-01/0066.html",
            },
            {
               name: "20120920 [CVE-ID REQUEST] Atlassian Confluence - Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/524217/30/450/threaded",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-22784",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2012-6342",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cross-site request forgery (CSRF) vulnerability in logout.action in Atlassian Confluence 3.4.6 allows remote attackers to hijack the authentication of administrators for requests that logout the user via a comment.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20130116 Re: [CVE-ID REQUEST] Atlassian Confluence - Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2013-01/0066.html",
                  },
                  {
                     name: "20120920 [CVE-ID REQUEST] Atlassian Confluence - Multiple Cross-Site Request Forgery (CSRF) Vulnerabilities",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/524217/30/450/threaded",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/116829/Atlassian-Confluence-3.0-Cross-Site-Request-Forgery.html",
                  },
                  {
                     name: "http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities",
                     refsource: "MISC",
                     url: "http://www.halock.com/blog/cve-2012-6342-atlassian-confluence-multiple-cross-site-request-forgery-csrf-vulnerabilities",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-22784",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-22784",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2012-6342",
      datePublished: "2014-05-13T14:00:00",
      dateReserved: "2012-12-13T00:00:00",
      dateUpdated: "2024-08-06T21:28:39.357Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-20239
Vulnerability from cvelistv5
Published
2019-04-30 15:28
Modified
2024-09-16 20:01
Severity ?
Summary
Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.
Impacted products
Vendor Product Version
Atlassian Atlassian Application Links Version: unspecified   < 5.0.11
Version: 5.1.0   < unspecified
Version: unspecified   < 5.2.10
Version: 5.3.0   < unspecified
Version: unspecified   < 5.3.6
Version: 5.4.0   < unspecified
Version: unspecified   < 5.4.12
Version: 6.0.0   < unspecified
Version: unspecified   < 6.0.4
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T11:58:18.795Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://ecosystem.atlassian.net/browse/APL-1373",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CRUC-8379",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/FE-7161",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-58208",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CWD-5362",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/JRASERVER-68855",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Atlassian Application Links",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "5.0.11",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "5.1.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "5.2.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "5.3.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "5.4.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "5.4.12",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.0.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-04-29T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross Site Scripting (XSS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-05-29T20:20:19",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://ecosystem.atlassian.net/browse/APL-1373",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CRUC-8379",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/FE-7161",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-58208",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CWD-5362",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/JRASERVER-68855",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2019-04-29T00:00:00",
               ID: "CVE-2018-20239",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Atlassian Application Links",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "5.0.11",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "5.1.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "5.2.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "5.3.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "5.3.6",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "5.4.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "5.4.12",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.0.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.0.4",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Application Links before version 5.0.11, from version 5.1.0 before 5.2.10, from version 5.3.0 before 5.3.6, from version 5.4.0 before 5.4.12, and from version 6.0.0 before 6.0.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the applinkStartingUrl parameter. The product is used as a plugin in various Atlassian products where the following are affected: Confluence before version 6.15.2, Crucible before version 4.7.0, Crowd before version 3.4.3, Fisheye before version 4.7.0, Jira before version 7.13.3 and 8.x before 8.1.0.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross Site Scripting (XSS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://ecosystem.atlassian.net/browse/APL-1373",
                     refsource: "MISC",
                     url: "https://ecosystem.atlassian.net/browse/APL-1373",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CRUC-8379",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CRUC-8379",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/FE-7161",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/FE-7161",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-58208",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-58208",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CWD-5362",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CWD-5362",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/JRASERVER-68855",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/JRASERVER-68855",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2018-20239",
      datePublished: "2019-04-30T15:28:27.775475Z",
      dateReserved: "2018-12-19T00:00:00",
      dateUpdated: "2024-09-16T20:01:43.685Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-29450
Vulnerability from cvelistv5
Published
2021-01-19 00:30
Modified
2024-09-16 17:49
Severity ?
Summary
Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 7.2.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:55:09.661Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-60854",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.2.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2020-01-07T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Denial of Service",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-19T00:30:14",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-60854",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2020-01-07T00:00:00",
               ID: "CVE-2020-29450",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.2.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Denial of Service",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-60854",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-60854",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2020-29450",
      datePublished: "2021-01-19T00:30:14.158347Z",
      dateReserved: "2020-12-01T00:00:00",
      dateUpdated: "2024-09-16T17:49:14.701Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-14175
Vulnerability from cvelistv5
Published
2020-07-24 07:05
Modified
2024-09-16 20:58
Severity ?
Summary
Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 7.4.2
Version: 7.5.0   < unspecified
Version: unspecified   < 7.5.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:39:36.159Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-60102",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.5.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2020-07-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Stored Cross-Site Scripting (SXSS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-24T07:05:16",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-60102",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2020-07-24T00:00:00",
               ID: "CVE-2020-14175",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.5.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Stored Cross-Site Scripting (SXSS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-60102",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-60102",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2020-14175",
      datePublished: "2020-07-24T07:05:16.144536Z",
      dateReserved: "2020-06-16T00:00:00",
      dateUpdated: "2024-09-16T20:58:53.451Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-43940
Vulnerability from cvelistv5
Published
2022-02-15 03:15
Modified
2024-10-08 16:38
Summary
Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. This vulnerability only affects installations of Confluence Server and Data Center on Windows. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 7.4.10
Version: 7.5.0   < unspecified
Version: unspecified   < 7.12.3
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 7.4.10
Version: 7.5.0   < unspecified
Version: unspecified   < 7.12.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:10:17.171Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-66550",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.4.10",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.12.3",
                        status: "affected",
                        version: "7.5.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.4.10",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.12.3",
                        status: "affected",
                        version: "7.5.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 7.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "REQUIRED",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2021-43940",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-08T16:35:44.027223Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-08T16:38:51.537Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.12.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.12.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-11-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. This vulnerability only affects installations of Confluence Server and Data Center on Windows. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-427",
                     description: "Uncontrolled Search Path Element (CWE-427)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-03-07T00:25:08",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-66550",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2021-11-26T00:00:00",
               ID: "CVE-2021-43940",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.12.3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.12.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Affected versions of Atlassian Confluence Server and Data Center allow authenticated local attackers to achieve elevated privileges on the local system via a DLL Hijacking vulnerability in the Confluence installer. This vulnerability only affects installations of Confluence Server and Data Center on Windows. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Uncontrolled Search Path Element (CWE-427)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-66550",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-66550",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2021-43940",
      datePublished: "2022-02-15T03:15:09.899432Z",
      dateReserved: "2021-11-16T00:00:00",
      dateUpdated: "2024-10-08T16:38:51.537Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26072
Vulnerability from cvelistv5
Published
2021-04-01 18:10
Modified
2024-09-17 01:40
Severity ?
Summary
The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 5.8.6
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 5.8.6
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:19:19.354Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-61399",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "5.8.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "5.8.6",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-04-01T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Server Side Request Forgery (SSRF)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-04-01T18:10:35",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-61399",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2021-04-01T00:00:00",
               ID: "CVE-2021-26072",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "5.8.6",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "5.8.6",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Server Side Request Forgery (SSRF)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-61399",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-61399",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2021-26072",
      datePublished: "2021-04-01T18:10:35.728227Z",
      dateReserved: "2021-01-25T00:00:00",
      dateUpdated: "2024-09-17T01:40:50.388Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-26136
Vulnerability from cvelistv5
Published
2022-07-20 17:25
Modified
2024-10-03 16:43
Severity ?
Summary
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
Impacted products
Vendor Product Version
Atlassian Bamboo Server Version: unspecified   < 8.0.9
Version: 8.1.0   < unspecified
Version: unspecified   < 8.1.8
Version: 8.2.0   < unspecified
Version: unspecified   < 8.2.4
Create a notification for this product.
   Atlassian Bamboo Data Center Version: unspecified   < 8.0.9
Version: 8.1.0   < unspecified
Version: unspecified   < 8.1.8
Version: 8.2.0   < unspecified
Version: unspecified   < 8.2.4
Create a notification for this product.
   Atlassian Bitbucket Server Version: unspecified   < 7.6.16
Version: 7.7.0   < unspecified
Version: 7.16.0   < unspecified
Version: unspecified   < 7.17.8
Version: 7.18.0   < unspecified
Version: unspecified   < 7.19.5
Version: 7.20.0   < unspecified
Version: unspecified   < 7.20.2
Version: 7.21.0   < unspecified
Version: unspecified   < 7.21.2
Version: 8.0.0
Version: 8.1.0
Create a notification for this product.
   Atlassian Bitbucket Data Center Version: unspecified   < 7.6.16
Version: 7.7.0   < unspecified
Version: 7.16.0   < unspecified
Version: unspecified   < 7.17.8
Version: 7.18.0   < unspecified
Version: unspecified   < 7.19.5
Version: 7.20.0   < unspecified
Version: unspecified   < 7.20.2
Version: 7.21.0   < unspecified
Version: unspecified   < 7.21.2
Version: 8.0.0
Version: 8.1.0
Create a notification for this product.
   Atlassian Confluence Server Version: unspecified   < 7.4.17
Version: 7.5.0   < unspecified
Version: unspecified   < 7.13.7
Version: 7.14.0   < unspecified
Version: unspecified   < 7.14.3
Version: 7.15.0   < unspecified
Version: unspecified   < 7.15.2
Version: 7.16.0   < unspecified
Version: unspecified   < 7.16.4
Version: 7.17.0   < unspecified
Version: unspecified   < 7.17.4
Version: 7.18.0
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 7.4.17
Version: 7.5.0   < unspecified
Version: unspecified   < 7.13.7
Version: 7.14.0   < unspecified
Version: unspecified   < 7.14.3
Version: 7.15.0   < unspecified
Version: unspecified   < 7.15.2
Version: 7.16.0   < unspecified
Version: unspecified   < 7.16.4
Version: 7.17.0   < unspecified
Version: unspecified   < 7.17.4
Version: 7.18.0
Create a notification for this product.
   Atlassian Crowd Server Version: unspecified   < 4.3.8
Version: 4.4.0   < unspecified
Version: unspecified   < 4.4.2
Version: 5.0.0
Create a notification for this product.
   Atlassian Crowd Data Center Version: unspecified   < 4.3.8
Version: 4.4.0   < unspecified
Version: unspecified   < 4.4.2
Version: 5.0.0
Create a notification for this product.
   Atlassian Crucible Version: unspecified   < 4.8.10
Create a notification for this product.
   Atlassian Fisheye Version: unspecified   < 4.8.10
Create a notification for this product.
   Atlassian Jira Core Server Version: unspecified   < 8.13.22
Version: 8.14.0   < unspecified
Version: unspecified   < 8.20.10
Version: 8.21.0   < unspecified
Version: unspecified   < 8.22.4
Create a notification for this product.
   Atlassian Jira Software Server Version: unspecified   < 8.13.22
Version: 8.14.0   < unspecified
Version: unspecified   < 8.20.10
Version: 8.21.0   < unspecified
Version: unspecified   < 8.22.4
Create a notification for this product.
   Atlassian Jira Software Data Center Version: unspecified   < 8.13.22
Version: 8.14.0   < unspecified
Version: unspecified   < 8.20.10
Version: 8.21.0   < unspecified
Version: unspecified   < 8.22.4
Create a notification for this product.
   Atlassian Jira Service Management Server Version: unspecified   < 4.13.22
Version: 4.14.0   < unspecified
Version: unspecified   < 4.20.10
Version: 4.21.0   < unspecified
Version: unspecified   < 4.22.4
Create a notification for this product.
   Atlassian Jira Service Management Data Center Version: unspecified   < 4.13.22
Version: 4.14.0   < unspecified
Version: unspecified   < 4.20.10
Version: 4.21.0   < unspecified
Version: unspecified   < 4.22.4
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:56:37.592Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/BAM-21795",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/BSERV-13370",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CWD-5815",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/FE-7410",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CRUC-8541",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/JRASERVER-73897",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "bamboo",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.2.10",
                        status: "affected",
                        version: "7.2.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.0.9",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.1.8",
                        status: "affected",
                        version: "8.1.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.2.4",
                        status: "affected",
                        version: "8.2.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "bitbucket",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.6.16",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.17.8",
                        status: "affected",
                        version: "7.7.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.19.5",
                        status: "affected",
                        version: "7.18.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.20.2",
                        status: "affected",
                        version: "7.20.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.21.2",
                        status: "affected",
                        version: "7.21.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*",
                     "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "bitbucket",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "8.0.0",
                     },
                     {
                        status: "affected",
                        version: "8.1.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.4.17",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.13.7",
                        status: "affected",
                        version: "7.5.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.14.3",
                        status: "affected",
                        version: "7.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.15.2",
                        status: "affected",
                        version: "7.15.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.16.4",
                        status: "affected",
                        version: "7.16.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.17.4",
                        status: "affected",
                        version: "7.17.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "7.18.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "7.4.17",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.13.7",
                        status: "affected",
                        version: "7.5.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.14.3",
                        status: "affected",
                        version: "7.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.15.2",
                        status: "affected",
                        version: "7.15.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.16.4",
                        status: "affected",
                        version: "7.16.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "7.17.4",
                        status: "affected",
                        version: "7.17.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "7.18.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "crowd",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.3.8",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.4.2",
                        status: "affected",
                        version: "4.4.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "crowd",
                  vendor: "atlassian",
                  versions: [
                     {
                        status: "affected",
                        version: "5.0.0",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "crucible",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.8.10",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fisheye",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.8.10",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.13.22",
                        status: "affected",
                        version: "8.13.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.20.10",
                        status: "affected",
                        version: "8.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.22.4",
                        status: "affected",
                        version: "8.21.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.13.22",
                        status: "affected",
                        version: "8.13.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.20.10",
                        status: "affected",
                        version: "8.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.22.4",
                        status: "affected",
                        version: "8.21.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:server:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_service_desk",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.13.22",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_service_desk",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.13.22",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_service_management",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.20.10",
                        status: "affected",
                        version: "4.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.22.4",
                        status: "affected",
                        version: "4.21.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "jira_service_management",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "4.20.10",
                        status: "affected",
                        version: "4.14.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "4.22.4",
                        status: "affected",
                        version: "4.21.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-26136",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-03T15:26:49.090400Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-03T16:43:16.268Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Bamboo Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.0.9",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.1.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.1.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.2.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.2.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Bamboo Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.0.9",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.1.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.1.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.2.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.2.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Bitbucket Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.6.16",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.18.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.19.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.20.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.20.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.21.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "8.0.0",
                  },
                  {
                     status: "affected",
                     version: "8.1.0",
                  },
               ],
            },
            {
               product: "Bitbucket Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.6.16",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.18.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.19.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.20.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.20.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.21.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "8.0.0",
                  },
                  {
                     status: "affected",
                     version: "8.1.0",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.17",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.13.7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.14.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.15.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.15.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.16.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.17.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "7.18.0",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.17",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.13.7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.14.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.15.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.15.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.16.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.17.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "7.18.0",
                  },
               ],
            },
            {
               product: "Crowd Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.3.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.4.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.4.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "5.0.0",
                  },
               ],
            },
            {
               product: "Crowd Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.3.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.4.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.4.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     status: "affected",
                     version: "5.0.0",
                  },
               ],
            },
            {
               product: "Crucible",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.8.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Fisheye",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.8.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Core Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Software Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Software Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "8.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "8.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Service Management Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Jira Service Management Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "4.13.22",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.20.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "4.21.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "4.22.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-07-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-180",
                     description: "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180).",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-20T17:25:18",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/BAM-21795",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/BSERV-13370",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CWD-5815",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/FE-7410",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CRUC-8541",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/JRASERVER-73897",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2022-07-20T00:00:00",
               ID: "CVE-2022-26136",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Bamboo Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.0.9",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.1.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.1.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.2.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.2.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Bamboo Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.0.9",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.1.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.1.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.2.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.2.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Bitbucket Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.6.16",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.7.0",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.18.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.19.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.20.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.20.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.21.2",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "8.0.0",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "8.1.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Bitbucket Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.6.16",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.7.0",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.18.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.19.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.20.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.20.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.21.2",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "8.0.0",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "8.1.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.17",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.13.7",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.14.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.15.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.15.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.16.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.17.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.4",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "7.18.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.17",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.13.7",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.14.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.15.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.15.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.16.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.17.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.4",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "7.18.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Crowd Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.3.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.4.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.4.2",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "5.0.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Crowd Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.3.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.4.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.4.2",
                                       },
                                       {
                                          version_affected: "=",
                                          version_value: "5.0.0",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Crucible",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.8.10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Fisheye",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.8.10",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Core Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.22.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Software Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.22.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Software Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "8.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "8.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "8.22.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Service Management Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.22.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Jira Service Management Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "4.13.22",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.20.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "4.21.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "4.22.4",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180).",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/BAM-21795",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/BAM-21795",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/BSERV-13370",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/BSERV-13370",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-79476",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-79476",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CWD-5815",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CWD-5815",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/FE-7410",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/FE-7410",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/CRUC-8541",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CRUC-8541",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/JRASERVER-73897",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/JRASERVER-73897",
                  },
                  {
                     name: "https://jira.atlassian.com/browse/JSDSERVER-11863",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/JSDSERVER-11863",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2022-26136",
      datePublished: "2022-07-20T17:25:18.803466Z",
      dateReserved: "2022-02-25T00:00:00",
      dateUpdated: "2024-10-03T16:43:16.268Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-3398
Vulnerability from cvelistv5
Published
2019-04-18 17:21
Modified
2025-02-07 12:26
Summary
Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.
Impacted products
Vendor Product Version
Atlassian Confluence Version: 2.0.0   < unspecified
Version: unspecified   < 6.6.13
Version: 6.7.0   < unspecified
Version: unspecified   < 6.12.4
Version: 6.13.0   < unspecified
Version: unspecified   < 6.13.4
Version: 6.14.0   < unspecified
Version: unspecified   < 6.14.3
Version: 6.15.0   < unspecified
Version: unspecified   < 6.15.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:12:09.521Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-58102",
               },
               {
                  name: "20190424 Confluence Security Advisory - 2019-04-17",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Apr/33",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html",
               },
               {
                  name: "108067",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108067",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 8.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2019-3398",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-07T12:26:29.325819Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2021-11-03",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-3398",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-22",
                        description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-07T12:26:33.915Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.6.13",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.12.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.13.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.13.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.14.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.15.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.15.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-04-17T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Path Traversal",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-11-12T17:06:43.000Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-58102",
            },
            {
               name: "20190424 Confluence Security Advisory - 2019-04-17",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Apr/33",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html",
            },
            {
               name: "108067",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108067",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2019-04-17T00:00:00",
               ID: "CVE-2019-3398",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">=",
                                          version_value: "2.0.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.6.13",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.7.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.12.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.13.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.14.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.15.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.15.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Path Traversal",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-58102",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-58102",
                  },
                  {
                     name: "20190424 Confluence Security Advisory - 2019-04-17",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Apr/33",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html",
                  },
                  {
                     name: "108067",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108067",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2019-3398",
      datePublished: "2019-04-18T17:21:37.687Z",
      dateReserved: "2018-12-19T00:00:00.000Z",
      dateUpdated: "2025-02-07T12:26:33.915Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22508
Vulnerability from cvelistv5
Published
2023-07-18 23:00
Modified
2024-08-02 10:13
Summary
This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22508 was introduced in version 6.1.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to avoid this bug using the following options: * Upgrade to a Confluence feature release greater than or equal to 8.2.0 (ie: 8.2, 8.2, 8.4, etc...) * Upgrade to a Confluence 7.19 LTS bugfix release greater than or equal to 7.19.8 (ie: 7.19.8, 7.19.9, 7.19.10, 7.19.11, etc...) * Upgrade to a Confluence 7.13 LTS bugfix release greater than or equal to 7.13.20 (Release available early August) See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Data Center & Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). If you are unable to upgrade your instance please use the following guide to workaround the issue https://confluence.atlassian.com/confkb/how-to-disable-the-jmx-network-port-for-cve-2023-22508-1267761550.html This vulnerability was discovered by a private user and reported via our Bug Bounty program.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:13:48.922Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-88221",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 6.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 6.1.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.8",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.2.0",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 6.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 6.1.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.8",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.2.0",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "a private user",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "This High severity RCE (Remote Code Execution) vulnerability known as CVE-2023-22508 was introduced in version 6.1.0 of Confluence Data Center & Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to avoid this bug using the following options: * Upgrade to a Confluence feature release greater than or equal to 8.2.0 (ie: 8.2, 8.2, 8.4, etc...) * Upgrade to a Confluence 7.19 LTS bugfix release greater than or equal to 7.19.8 (ie: 7.19.8, 7.19.9, 7.19.10, 7.19.11, etc...) * Upgrade to a Confluence 7.13 LTS bugfix release greater than or equal to 7.13.20 (Release available early August) See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Data Center & Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). If you are unable to upgrade your instance please use the following guide to workaround the issue https://confluence.atlassian.com/confkb/how-to-disable-the-jmx-network-port-for-cve-2023-22508-1267761550.html This vulnerability was discovered by a private user and reported via our Bug Bounty program.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 8.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RCE (Remote Code Execution)",
                     lang: "en",
                     type: "RCE (Remote Code Execution)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-07-28T17:00:01.069Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-88221",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22508",
      datePublished: "2023-07-18T23:00:00.725Z",
      dateReserved: "2023-01-01T00:01:22.330Z",
      dateUpdated: "2024-08-02T10:13:48.922Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2012-2926
Vulnerability from cvelistv5
Published
2012-05-22 15:00
Modified
2024-08-06 19:50
Severity ?
Summary
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T19:50:05.307Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "fisheye-crucible-xml-dos(75682)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682",
               },
               {
                  name: "49146",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/49146",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
               },
               {
                  name: "81993",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/81993",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
               },
               {
                  name: "53595",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/53595",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
               },
               {
                  name: "jira-xml-dos(75697)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2012-05-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "fisheye-crucible-xml-dos(75682)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682",
            },
            {
               name: "49146",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/49146",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
            },
            {
               name: "81993",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/81993",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
            },
            {
               name: "53595",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/53595",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
            },
            {
               name: "jira-xml-dos(75697)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2012-2926",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "fisheye-crucible-xml-dos(75682)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682",
                  },
                  {
                     name: "49146",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/49146",
                  },
                  {
                     name: "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
                     refsource: "CONFIRM",
                     url: "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17",
                  },
                  {
                     name: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
                     refsource: "CONFIRM",
                     url: "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17",
                  },
                  {
                     name: "81993",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/81993",
                  },
                  {
                     name: "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
                     refsource: "CONFIRM",
                     url: "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17",
                  },
                  {
                     name: "53595",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/53595",
                  },
                  {
                     name: "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
                     refsource: "CONFIRM",
                     url: "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17",
                  },
                  {
                     name: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
                     refsource: "CONFIRM",
                     url: "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17",
                  },
                  {
                     name: "jira-xml-dos(75697)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2012-2926",
      datePublished: "2012-05-22T15:00:00",
      dateReserved: "2012-05-22T00:00:00",
      dateUpdated: "2024-08-06T19:50:05.307Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22522
Vulnerability from cvelistv5
Published
2023-12-06 05:00
Modified
2024-08-02 10:13
Severity ?
Summary
This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: >= 4.0.0
Version: >= 7.20.0
Version: >= 8.0.0
Version: >= 8.6.0
Create a notification for this product.
   Atlassian Confluence Server Version: >= 4.0.0
Version: >= 7.20.0
Version: >= 8.0.0
Version: >= 8.6.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:13:48.928Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1319570362",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-93502",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 4.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 4.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.20.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.17",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.4.5",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.4",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.6.2",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.7.1",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 4.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 4.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.20.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.17",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.4.5",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.4",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.6.2",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.7.1",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details\n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 9,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RCE (Remote Code Execution)",
                     lang: "en",
                     type: "RCE (Remote Code Execution)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-12-06T21:00:01.250Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1319570362",
            },
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-93502",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22522",
      datePublished: "2023-12-06T05:00:02.870Z",
      dateReserved: "2023-01-01T00:01:22.333Z",
      dateUpdated: "2024-08-02T10:13:48.928Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21683
Vulnerability from cvelistv5

This CVE's publication may have been a false positive or a mistake. As a result, we have rejected this record.

Show details on NVD website


{
   containers: {
      cna: {
         providerMetadata: {
            dateUpdated: "2025-01-01T00:00:18.301Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         rejectedReasons: [
            {
               lang: "en-US",
               value: "This CVE's publication may have been a false positive or a mistake. As a result, we have rejected this record.",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2024-21683",
      datePublished: "2024-05-21T23:00:00.446Z",
      dateRejected: "2025-01-01T00:00:18.301Z",
      dateReserved: "2024-01-01T00:05:33.846Z",
      dateUpdated: "2025-01-01T00:00:18.301Z",
      state: "REJECTED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-4027
Vulnerability from cvelistv5
Published
2020-07-01 01:35
Modified
2024-09-17 01:56
Severity ?
Summary
Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 7.4.5
Version: 7.5.0   < unspecified
Version: unspecified   < 7.5.1
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 7.4.5
Version: 7.5.0   < unspecified
Version: unspecified   < 7.5.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T07:52:20.854Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-59898",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.5.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.5.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2020-06-18T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-02-04T05:52:12",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-59898",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2020-06-18T00:00:00",
               ID: "CVE-2020-4027",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.5.1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.5.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-59898",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-59898",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2020-4027",
      datePublished: "2020-07-01T01:35:29.292383Z",
      dateReserved: "2019-12-30T00:00:00",
      dateUpdated: "2024-09-17T01:56:01.138Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-29444
Vulnerability from cvelistv5
Published
2021-05-07 06:10
Modified
2025-02-12 20:56
Summary
Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 7.11.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:55:09.765Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-61266",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "NONE",
                     baseScore: 5.4,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "LOW",
                     integrityImpact: "LOW",
                     privilegesRequired: "LOW",
                     scope: "CHANGED",
                     userInteraction: "REQUIRED",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2020-29444",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-12T20:54:56.860211Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-79",
                        description: "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-12T20:56:00.990Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.11.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-04-22T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross Site Scripting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-05-07T06:10:11.000Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-61266",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2021-04-22T00:00:00",
               ID: "CVE-2020-29444",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross Site Scripting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-61266",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-61266",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2020-29444",
      datePublished: "2021-05-07T06:10:11.632Z",
      dateReserved: "2020-12-01T00:00:00.000Z",
      dateUpdated: "2025-02-12T20:56:00.990Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-3396
Vulnerability from cvelistv5
Published
2019-03-25 18:37
Modified
2025-02-07 12:25
Severity ?
Summary
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 6.6.12
Version: 6.7.0   < unspecified
Version: unspecified   < 6.12.3
Version: next of 6.13.0   < unspecified
Version: unspecified   < 6.13.3
Version: next of 6.14.0   < unspecified
Version: unspecified   < 6.14.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:12:09.544Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-57974",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector",
               },
               {
                  name: "46731",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/46731/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2019-3396",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-07T12:25:45.543931Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2021-11-03",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-3396",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-22",
                        description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-07T12:25:50.601Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.6.12",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.12.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "next of 6.13.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.13.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "next of 6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.14.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-03-20T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Server-Side Template Injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-22T16:06:08.000Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-57974",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector",
            },
            {
               name: "46731",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/46731/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2019-03-20T10:00:00",
               ID: "CVE-2019-3396",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.6.12",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.7.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.12.3",
                                       },
                                       {
                                          version_affected: ">",
                                          version_value: "6.13.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.3",
                                       },
                                       {
                                          version_affected: ">",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.14.2",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Server-Side Template Injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-57974",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-57974",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html",
                  },
                  {
                     name: "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector",
                     refsource: "MISC",
                     url: "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector",
                  },
                  {
                     name: "46731",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/46731/",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2019-3396",
      datePublished: "2019-03-25T18:37:06.256Z",
      dateReserved: "2018-12-19T00:00:00.000Z",
      dateUpdated: "2025-02-07T12:25:50.601Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22526
Vulnerability from cvelistv5
Published
2024-01-16 05:00
Modified
2024-08-02 10:13
Summary
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 7.19.0 of Confluence Data Center. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release 7.19.17, or any higher 7.19.x release Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html]). You can download the latest version of Confluence Data Center from the download center ([https://www.atlassian.com/software/confluence/download-archives]). This vulnerability was discovered by m1sn0w and reported via our Bug Bounty program
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: >= 7.13.0
Version: >= 7.19.0
Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.6.0
Version: >= 8.7.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:13:48.994Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-93516",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.13.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.13.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.7.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.17",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.5",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.7.2",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "m1sn0w",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "This High severity RCE (Remote Code Execution) vulnerability was introduced in version 7.19.0 of Confluence Data Center.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.\r\n\r\nAtlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Confluence Data Center and Server 7.19: Upgrade to a release 7.19.17, or any higher 7.19.x release\r\n Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release\r\n Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release\r\n\r\nSee the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html]). You can download the latest version of Confluence Data Center from the download center ([https://www.atlassian.com/software/confluence/download-archives]).\r\n\r\nThis vulnerability was discovered by m1sn0w and reported via our Bug Bounty program",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RCE (Remote Code Execution)",
                     lang: "en",
                     type: "RCE (Remote Code Execution)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-16T18:00:00.754Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615",
            },
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-93516",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22526",
      datePublished: "2024-01-16T05:00:00.597Z",
      dateReserved: "2023-01-01T00:01:22.333Z",
      dateUpdated: "2024-08-02T10:13:48.994Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-36290
Vulnerability from cvelistv5
Published
2022-07-26 04:05
Modified
2024-10-03 18:36
Severity ?
Summary
The Livesearch macro in Confluence Server and Data Center before version 7.4.5, from version 7.5.0 before 7.6.3, and from version 7.7.0 before version 7.7.4 allows remote attackers with permission to edit a page or blog to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the page excerpt functionality.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 7.4.5
Version: 7.5.0   < unspecified
Version: unspecified   < 7.6.3
Version: 7.7.0   < unspecified
Version: unspecified   < 7.7.4
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 7.4.5
Version: 7.5.0   < unspecified
Version: unspecified   < 7.6.3
Version: 7.7.0   < unspecified
Version: unspecified   < 7.7.4
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T17:23:09.942Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-60118",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2020-36290",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-03T18:36:19.960463Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-03T18:36:30.272Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.6.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.7.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.6.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.7.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-07-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Livesearch macro in Confluence Server and Data Center before version 7.4.5, from version 7.5.0 before 7.6.3, and from version 7.7.0 before version 7.7.4 allows remote attackers with permission to edit a page or blog to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the page excerpt functionality.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Cross Site Scripting (XSS)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-07-26T04:05:14",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-60118",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2022-07-26T00:00:00",
               ID: "CVE-2020-36290",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.6.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.7.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.7.4",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.6.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.7.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.7.4",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Livesearch macro in Confluence Server and Data Center before version 7.4.5, from version 7.5.0 before 7.6.3, and from version 7.7.0 before version 7.7.4 allows remote attackers with permission to edit a page or blog to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the page excerpt functionality.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Cross Site Scripting (XSS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-60118",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-60118",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2020-36290",
      datePublished: "2022-07-26T04:05:14.704626Z",
      dateReserved: "2021-03-31T00:00:00",
      dateUpdated: "2024-10-03T18:36:30.272Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2016-6668
Vulnerability from cvelistv5
Published
2017-01-23 21:00
Modified
2024-08-06 01:36
Severity ?
Summary
The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T01:36:29.463Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20161006 September 2016 - HipChat Plugin for various products - Critical Security Advisory",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/539530/100/0/threaded",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html",
               },
               {
                  name: "93159",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/93159",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2016-09-21T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-09T18:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20161006 September 2016 - HipChat Plugin for various products - Critical Security Advisory",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/539530/100/0/threaded",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html",
            },
            {
               name: "93159",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/93159",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2016-6668",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20161006 September 2016 - HipChat Plugin for various products - Critical Security Advisory",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/539530/100/0/threaded",
                  },
                  {
                     name: "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html",
                     refsource: "CONFIRM",
                     url: "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-security-advisory-2016-09-21-840698321.html",
                  },
                  {
                     name: "https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html",
                     refsource: "CONFIRM",
                     url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2016-09-21-849052104.html",
                  },
                  {
                     name: "93159",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/93159",
                  },
                  {
                     name: "https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html",
                     refsource: "CONFIRM",
                     url: "https://confluence.atlassian.com/jira/jira-and-hipchat-for-jira-plugin-security-advisory-2016-09-21-849052099.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/139004/Atlassian-HipChat-Secret-Key-Disclosure.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2016-6668",
      datePublished: "2017-01-23T21:00:00",
      dateReserved: "2016-08-10T00:00:00",
      dateUpdated: "2024-08-06T01:36:29.463Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-15006
Vulnerability from cvelistv5
Published
2019-12-19 00:50
Modified
2024-09-17 01:15
Severity ?
Summary
There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information.
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: 6.11.0   < unspecified
Version: unspecified   < 6.13.10
Version: 6.14.0   < unspecified
Version: unspecified   < 6.15.10
Version: 7.0.1   < unspecified
Version: unspecified   < 7.0.5
Version: 7.1.0   < unspecified
Version: unspecified   < 7.1.2
Version: 7.2.0-beta1   < unspecified
Version: unspecified   < 7.2.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T00:34:53.000Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-59244",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://twitter.com/SwiftOnSecurity/status/1202034106495832067",
               },
               {
                  name: "20191219 Confluence Server and Data Center Security Advisory - 2019-12-18 - CVE-2019-15006",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Dec/36",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.11.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.13.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.15.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.0.1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.0.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.1.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.1.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.2.0-beta1",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.2.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-12-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Man-in-the-Middle (MitM)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-12-21T08:06:01",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-59244",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://twitter.com/SwiftOnSecurity/status/1202034106495832067",
            },
            {
               name: "20191219 Confluence Server and Data Center Security Advisory - 2019-12-18 - CVE-2019-15006",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Dec/36",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2019-12-19T00:00:00",
               ID: "CVE-2019-15006",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">=",
                                          version_value: "6.11.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.13.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.15.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.0.1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.0.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.1.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.1.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.2.0-beta1",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.2.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Man-in-the-Middle (MitM)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-59244",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-59244",
                  },
                  {
                     name: "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html",
                     refsource: "MISC",
                     url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html",
                  },
                  {
                     name: "https://twitter.com/SwiftOnSecurity/status/1202034106495832067",
                     refsource: "MISC",
                     url: "https://twitter.com/SwiftOnSecurity/status/1202034106495832067",
                  },
                  {
                     name: "20191219 Confluence Server and Data Center Security Advisory - 2019-12-18 - CVE-2019-15006",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Dec/36",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2019-15006",
      datePublished: "2019-12-19T00:50:12.007660Z",
      dateReserved: "2019-08-13T00:00:00",
      dateUpdated: "2024-09-17T01:15:47.661Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-26085
Vulnerability from cvelistv5
Published
2021-08-03 00:00
Modified
2025-02-07 12:37
Summary
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 7.4.10
Version: 7.5.0   < unspecified
Version: unspecified   < 7.12.3
Create a notification for this product.
   Atlassian Confluence Data Center Version: unspecified   < 7.4.10
Version: 7.5.0   < unspecified
Version: unspecified   < 7.12.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T20:19:19.799Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-67893",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "NONE",
                     baseScore: 5.3,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "LOW",
                     integrityImpact: "NONE",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2021-26085",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-07T12:29:39.323995Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2022-03-28",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2021-26085",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-425",
                        description: "CWE-425 Direct Request ('Forced Browsing')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-07T12:37:12.832Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.12.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.10",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.12.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-07-29T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Pre-Authorization Arbitrary File Read",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-05T16:06:18.000Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-67893",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2021-07-29T00:00:00",
               ID: "CVE-2021-26085",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.12.3",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.10",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.12.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Pre-Authorization Arbitrary File Read",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-67893",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-67893",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2021-26085",
      datePublished: "2021-08-03T00:00:12.199Z",
      dateReserved: "2021-01-25T00:00:00.000Z",
      dateUpdated: "2025-02-07T12:37:12.832Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-22515
Vulnerability from cvelistv5
Published
2023-10-04 14:00
Modified
2024-09-13 18:13
Severity ?
Summary
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: >= 8.0.0
Version: >= 8.0.1
Version: >= 8.0.2
Version: >= 8.0.3
Version: >= 8.1.3
Version: >= 8.1.4
Version: >= 8.2.0
Version: >= 8.2.1
Version: >= 8.2.2
Version: >= 8.2.3
Version: >= 8.3.0
Version: >= 8.3.1
Version: >= 8.3.2
Version: >= 8.4.0
Version: >= 8.4.1
Version: >= 8.4.2
Version: >= 8.5.0
Version: >= 8.5.1
Create a notification for this product.
   Atlassian Confluence Server Version: >= 8.0.0
Version: >= 8.0.1
Version: >= 8.0.2
Version: >= 8.0.3
Version: >= 8.1.3
Version: >= 8.1.4
Version: >= 8.2.0
Version: >= 8.2.1
Version: >= 8.2.2
Version: >= 8.2.3
Version: >= 8.3.0
Version: >= 8.3.1
Version: >= 8.3.2
Version: >= 8.4.0
Version: >= 8.4.1
Version: >= 8.4.2
Version: >= 8.5.0
Version: >= 8.5.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T10:13:48.693Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-92475",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "affected",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.3.3",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "affected",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.4.3",
                        status: "affected",
                        version: "8.4.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "affected",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.5.2",
                        status: "affected",
                        version: "8.5.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "affected",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.3.3",
                        status: "affected",
                        version: "8.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "affected",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.4.3",
                        status: "affected",
                        version: "8.4.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "affected",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.5.2",
                        status: "affected",
                        version: "8.5.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2023-22515",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-12-09T05:05:17.297744Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-10-05",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-22515",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-20",
                        description: "CWE-20 Improper Input Validation",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-13T18:13:18.030Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.3",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.3",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.4",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.3",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.3.3",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.4.3",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.2",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.3",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.3",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.4",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.3",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.1",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.2",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.3.3",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.4.3",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.2",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "an Atlassian customer",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. ",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 10,
                  baseSeverity: "CRITICAL",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "BASM (Broken Authentication & Session Management)",
                     lang: "en",
                     type: "BASM (Broken Authentication & Session Management)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-10-20T16:00:01.026Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html",
            },
            {
               url: "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515",
            },
            {
               url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276",
            },
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-92475",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2023-22515",
      datePublished: "2023-10-04T14:00:00.820Z",
      dateReserved: "2023-01-01T00:01:22.331Z",
      dateUpdated: "2024-09-13T18:13:18.030Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21674
Vulnerability from cvelistv5
Published
2024-01-16 05:00
Modified
2024-08-29 14:38
Summary
This High severity Remote Code Execution (RCE) vulnerability was introduced in version 7.13.0 of Confluence Data Center and Server. Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.6 and a CVSS Vector of CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, no impact to integrity, no impact to availability, and does not require user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release * Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release * Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: >= 7.19.0
Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.6.0
Version: >= 8.7.1
Create a notification for this product.
   Atlassian Confluence Server Version: >= 7.19.0
Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.6.0
Version: >= 8.7.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:36.170Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-94066",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21674",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-29T14:37:34.659948Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-94",
                        description: "CWE-94 Improper Control of Generation of Code ('Code Injection')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-29T14:38:32.248Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.7.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.18",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.5",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.7.2",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.7.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.18",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.5",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "DDV_UA",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "This High severity Remote Code Execution (RCE) vulnerability was introduced in version 7.13.0 of Confluence Data Center and Server.\n\nRemote Code Execution (RCE) vulnerability, with a CVSS Score of 8.6 and a CVSS Vector of CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, no impact to integrity, no impact to availability, and does not require user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release\n* Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release\n* Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 8.6,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RCE (Remote Code Execution)",
                     lang: "en",
                     type: "RCE (Remote Code Execution)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-16T17:00:02.134Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-94066",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2024-21674",
      datePublished: "2024-01-16T05:00:00.639Z",
      dateReserved: "2024-01-01T00:05:33.845Z",
      dateUpdated: "2024-08-29T14:38:32.248Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-29445
Vulnerability from cvelistv5
Published
2021-05-07 06:10
Modified
2025-02-12 20:56
Summary
Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 7.4.8
Version: 7.5.0   < unspecified
Version: unspecified   < 7.11.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T16:55:10.375Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-61453",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "NONE",
                     baseScore: 4.3,
                     baseSeverity: "MEDIUM",
                     confidentialityImpact: "LOW",
                     integrityImpact: "NONE",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2020-29445",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-12T20:56:45.444215Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-918",
                        description: "CWE-918 Server-Side Request Forgery (SSRF)",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-12T20:56:52.029Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "7.4.8",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.5.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.11.0",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2021-04-22T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Server-Side Request Forgery",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-06-17T12:15:42.000Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-61453",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2021-04-22T00:00:00",
               ID: "CVE-2020-29445",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.8",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.5.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.11.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Server-Side Request Forgery",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-61453",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-61453",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2020-29445",
      datePublished: "2021-05-07T06:10:12.303Z",
      dateReserved: "2020-12-01T00:00:00.000Z",
      dateUpdated: "2025-02-12T20:56:52.029Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-3395
Vulnerability from cvelistv5
Published
2019-03-25 18:37
Modified
2024-09-17 00:20
Severity ?
Summary
The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery.
References
Impacted products
Vendor Product Version
Atlassian Confluence Server Version: unspecified   < 6.6.7
Version: 6.7.0   < unspecified
Version: unspecified   <
Version: 6.8.0   < unspecified
Version: unspecified   < 6.8.5
Version: 6.9.0   < unspecified
Version: unspecified   < 6.9.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T19:12:08.548Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-57971",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "6.6.7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "6.7.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.8.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.8.5",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "6.9.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "6.9.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-03-20T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Server-Side Request Forgery (SSRF)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-03-25T18:37:06",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-57971",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2019-03-20T10:00:00",
               ID: "CVE-2019-3395",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<",
                                          version_value: "6.6.7",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.7.0",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_value: "6.7.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.8.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.8.5",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "6.9.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "6.9.3",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Server-Side Request Forgery (SSRF)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-57971",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-57971",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2019-3395",
      datePublished: "2019-03-25T18:37:06.217310Z",
      dateReserved: "2018-12-19T00:00:00",
      dateUpdated: "2024-09-17T00:20:30.157Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-21673
Vulnerability from cvelistv5
Published
2024-01-16 05:00
Modified
2024-10-23 15:24
Summary
This High severity Remote Code Execution (RCE) vulnerability was introduced in versions 7.13.0 of Confluence Data Center and Server. Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.0 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H allows an authenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and does not require user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release * Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release * Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: >= 7.13.0
Version: >= 7.19.0
Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.6.0
Version: >= 8.7.1
Create a notification for this product.
   Atlassian Confluence Server Version: >= 7.13.0
Version: >= 7.19.0
Version: >= 8.0.0
Version: >= 8.1.0
Version: >= 8.2.0
Version: >= 8.3.0
Version: >= 8.4.0
Version: >= 8.5.0
Version: >= 8.6.0
Version: >= 8.7.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:27:36.035Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-94065",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_data_center:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_data_center",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.7.2",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:atlassian:confluence_server:-:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "confluence_server",
                  vendor: "atlassian",
                  versions: [
                     {
                        lessThan: "8.7.1",
                        status: "affected",
                        version: "0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21673",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-01-25T05:00:56.340614Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-23T15:24:02.784Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.13.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.13.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.7.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.18",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.5",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.7.2",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     status: "unaffected",
                     version: "< 7.13.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.13.0",
                  },
                  {
                     status: "affected",
                     version: ">= 7.19.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.0.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.1.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.2.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.3.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.4.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.5.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.6.0",
                  },
                  {
                     status: "affected",
                     version: ">= 8.7.1",
                  },
                  {
                     status: "unaffected",
                     version: ">= 7.19.18",
                  },
                  {
                     status: "unaffected",
                     version: ">= 8.5.5",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "xiaoc",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "This High severity Remote Code Execution (RCE) vulnerability was introduced in versions 7.13.0 of Confluence Data Center and Server.\n\nRemote Code Execution (RCE) vulnerability, with a CVSS Score of 8.0 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H allows an authenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and does not require user interaction.\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release\n* Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release\n* Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release\n\nSee the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  baseScore: 8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "RCE (Remote Code Execution)",
                     lang: "en",
                     type: "RCE (Remote Code Execution)",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-01-16T18:00:00.463Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               url: "https://jira.atlassian.com/browse/CONFSERVER-94065",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2024-21673",
      datePublished: "2024-01-16T05:00:00.724Z",
      dateReserved: "2024-01-01T00:05:33.845Z",
      dateUpdated: "2024-10-23T15:24:02.784Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-26134
Vulnerability from cvelistv5
Published
2022-06-03 21:51
Modified
2025-02-04 14:18
Severity ?
Summary
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
Impacted products
Vendor Product Version
Atlassian Confluence Data Center Version: next of 1.3.0   < unspecified
Version: unspecified   < 7.4.17
Version: 7.13.0   < unspecified
Version: unspecified   < 7.13.7
Version: 7.14.0   < unspecified
Version: unspecified   < 7.14.3
Version: 7.15.0   < unspecified
Version: unspecified   < 7.15.2
Version: 7.16.0   < unspecified
Version: unspecified   < 7.16.4
Version: 7.17.0   < unspecified
Version: unspecified   < 7.17.4
Version: 7.18.0   < unspecified
Version: unspecified   < 7.18.1
Create a notification for this product.
   Atlassian Confluence Server Version: next of 1.3.0   < unspecified
Version: unspecified   < 7.4.17
Version: 7.13.0   < unspecified
Version: unspecified   < 7.13.7
Version: 7.14.0   < unspecified
Version: unspecified   < 7.14.3
Version: 7.15.0   < unspecified
Version: unspecified   < 7.15.2
Version: 7.16.0   < unspecified
Version: unspecified   < 7.16.4
Version: 7.17.0   < unspecified
Version: unspecified   < 7.17.4
Version: 7.18.0   < unspecified
Version: unspecified   < 7.18.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:56:37.787Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://jira.atlassian.com/browse/CONFSERVER-79016",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2022-26134",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-04T14:18:48.606174Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2022-06-02",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-26134",
                     },
                     type: "kev",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-917",
                        description: "CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-04T14:18:51.802Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Confluence Data Center",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "next of 1.3.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.4.17",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.13.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.13.7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.14.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.15.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.15.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.16.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.17.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.18.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.18.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "Confluence Server",
               vendor: "Atlassian",
               versions: [
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "next of 1.3.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.4.17",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.13.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.13.7",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.14.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.14.3",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.15.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.15.2",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.16.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.16.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.17.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.17.4",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
                  {
                     lessThan: "unspecified",
                     status: "affected",
                     version: "7.18.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.18.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2022-05-31T00:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               value: "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-30T05:20:13.000Z",
            orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
            shortName: "atlassian",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://jira.atlassian.com/browse/CONFSERVER-79016",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@atlassian.com",
               DATE_PUBLIC: "2022-05-31T20:00:00",
               ID: "CVE-2022-26134",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Confluence Data Center",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">",
                                          version_value: "1.3.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.17",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.13.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.13.7",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.14.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.15.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.15.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.16.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.17.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.18.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.18.1",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "Confluence Server",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">",
                                          version_value: "1.3.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.4.17",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.13.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.13.7",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.14.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.14.3",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.15.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.15.2",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.16.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.16.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.17.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.17.4",
                                       },
                                       {
                                          version_affected: ">=",
                                          version_value: "7.18.0",
                                       },
                                       {
                                          version_affected: "<",
                                          version_value: "7.18.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Atlassian",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Remote Code Execution",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://jira.atlassian.com/browse/CONFSERVER-79016",
                     refsource: "MISC",
                     url: "https://jira.atlassian.com/browse/CONFSERVER-79016",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html",
                  },
                  {
                     name: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html",
                     refsource: "MISC",
                     url: "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
      assignerShortName: "atlassian",
      cveId: "CVE-2022-26134",
      datePublished: "2022-06-03T21:51:57.134Z",
      dateReserved: "2022-02-25T00:00:00.000Z",
      dateUpdated: "2025-02-04T14:18:51.802Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}