CVE-2023-22515
Vulnerability from cvelistv5
Published
2023-10-04 14:00
Modified
2024-09-13 18:13
Severity ?
EPSS score ?
Summary
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Confluence Data Center |
Version: >= 8.0.0 Version: >= 8.0.1 Version: >= 8.0.2 Version: >= 8.0.3 Version: >= 8.1.3 Version: >= 8.1.4 Version: >= 8.2.0 Version: >= 8.2.1 Version: >= 8.2.2 Version: >= 8.2.3 Version: >= 8.3.0 Version: >= 8.3.1 Version: >= 8.3.2 Version: >= 8.4.0 Version: >= 8.4.1 Version: >= 8.4.2 Version: >= 8.5.0 Version: >= 8.5.1 |
||||
|
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2023-10-05
Due date: 2023-10-13
Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.
Used in ransomware: Known
Notes: https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22515
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html" }, { "tags": [ "x_transferred" ], "url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515" }, { "tags": [ "x_transferred" ], "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276" }, { "tags": [ "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-92475" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.3.3", "status": "affected", "version": "8.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.4.3", "status": "affected", "version": "8.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.5.2", "status": "affected", "version": "8.5.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.3.3", "status": "affected", "version": "8.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.4.3", "status": "affected", "version": "8.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.5.2", "status": "affected", "version": "8.5.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-22515", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-12-09T05:05:17.297744Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-10-05", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-22515" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-13T18:13:18.030Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "\u003c 8.0.0" }, { "status": "affected", "version": "\u003e= 8.0.0" }, { "status": "affected", "version": "\u003e= 8.0.1" }, { "status": "affected", "version": "\u003e= 8.0.2" }, { "status": "affected", "version": "\u003e= 8.0.3" }, { "status": "affected", "version": "\u003e= 8.1.3" }, { "status": "affected", "version": "\u003e= 8.1.4" }, { "status": "affected", "version": "\u003e= 8.2.0" }, { "status": "affected", "version": "\u003e= 8.2.1" }, { "status": "affected", "version": "\u003e= 8.2.2" }, { "status": "affected", "version": "\u003e= 8.2.3" }, { "status": "affected", "version": "\u003e= 8.3.0" }, { "status": "affected", "version": "\u003e= 8.3.1" }, { "status": "affected", "version": "\u003e= 8.3.2" }, { "status": "affected", "version": "\u003e= 8.4.0" }, { "status": "affected", "version": "\u003e= 8.4.1" }, { "status": "affected", "version": "\u003e= 8.4.2" }, { "status": "affected", "version": "\u003e= 8.5.0" }, { "status": "affected", "version": "\u003e= 8.5.1" }, { "status": "unaffected", "version": "\u003e= 8.3.3" }, { "status": "unaffected", "version": "\u003e= 8.4.3" }, { "status": "unaffected", "version": "\u003e= 8.5.2" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "\u003c 8.0.0" }, { "status": "affected", "version": "\u003e= 8.0.0" }, { "status": "affected", "version": "\u003e= 8.0.1" }, { "status": "affected", "version": "\u003e= 8.0.2" }, { "status": "affected", "version": "\u003e= 8.0.3" }, { "status": "affected", "version": "\u003e= 8.1.3" }, { "status": "affected", "version": "\u003e= 8.1.4" }, { "status": "affected", "version": "\u003e= 8.2.0" }, { "status": "affected", "version": "\u003e= 8.2.1" }, { "status": "affected", "version": "\u003e= 8.2.2" }, { "status": "affected", "version": "\u003e= 8.2.3" }, { "status": "affected", "version": "\u003e= 8.3.0" }, { "status": "affected", "version": "\u003e= 8.3.1" }, { "status": "affected", "version": "\u003e= 8.3.2" }, { "status": "affected", "version": "\u003e= 8.4.0" }, { "status": "affected", "version": "\u003e= 8.4.1" }, { "status": "affected", "version": "\u003e= 8.4.2" }, { "status": "affected", "version": "\u003e= 8.5.0" }, { "status": "affected", "version": "\u003e= 8.5.1" }, { "status": "unaffected", "version": "\u003e= 8.3.3" }, { "status": "unaffected", "version": "\u003e= 8.4.3" }, { "status": "unaffected", "version": "\u003e= 8.5.2" } ] } ], "credits": [ { "lang": "en", "value": "an Atlassian customer" } ], "descriptions": [ { "lang": "en", "value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. " } ], "metrics": [ { "cvssV3_0": { "baseScore": 10, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "BASM (Broken Authentication \u0026 Session Management)", "lang": "en", "type": "BASM (Broken Authentication \u0026 Session Management)" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T16:00:01.026Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html" }, { "url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515" }, { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276" }, { "url": "https://jira.atlassian.com/browse/CONFSERVER-92475" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2023-22515", "datePublished": "2023-10-04T14:00:00.820Z", "dateReserved": "2023-01-01T00:01:22.331Z", "dateUpdated": "2024-09-13T18:13:18.030Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "cisa_known_exploited": { "cveID": "CVE-2023-22515", "dateAdded": "2023-10-05", "dueDate": "2023-10-13", "knownRansomwareCampaignUse": "Known", "notes": "https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22515", "product": "Confluence Data Center and Server", "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.", "shortDescription": "Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.", "vendorProject": "Atlassian", "vulnerabilityName": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2023-22515\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2023-10-04T14:15:10.440\",\"lastModified\":\"2024-11-21T07:44:57.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \\r\\n\\r\\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. \"},{\"lang\":\"es\",\"value\":\"Atlassian ha sido informado de un problema informado por un pu\u00f1ado de clientes en el que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center and Server de acceso p\u00fablico para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@atlassian.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0}]},\"cisaExploitAdd\":\"2023-10-05\",\"cisaActionDue\":\"2023-10-13\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.\",\"cisaVulnerabilityName\":\"Atlassian Confluence Data Center and Server Broken Access Control Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.3.3\",\"matchCriteriaId\":\"85B2AD9F-CBA6-4559-9AE3-5F76A9EC3B7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.4.0\",\"versionEndExcluding\":\"8.4.3\",\"matchCriteriaId\":\"38F9918D-6848-4CD6-8096-4FB48C23818B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.5.0\",\"versionEndExcluding\":\"8.5.2\",\"matchCriteriaId\":\"8D646BCF-214F-449D-AEEB-B253E8715394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.3.3\",\"matchCriteriaId\":\"970A3DA7-5114-4696-A93D-C3D5AFF5C6C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.4.0\",\"versionEndExcluding\":\"8.4.3\",\"matchCriteriaId\":\"A2EB19CD-AE29-4775-91C5-05B01A96AC6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.5.0\",\"versionEndExcluding\":\"8.5.2\",\"matchCriteriaId\":\"79229BE7-0AA0-4308-8BB2-8FB11E8B9AD7\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html\",\"source\":\"security@atlassian.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515\",\"source\":\"security@atlassian.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276\",\"source\":\"security@atlassian.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/CONFSERVER-92475\",\"source\":\"security@atlassian.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/CONFSERVER-92475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.