cve-2023-22512
Vulnerability from cvelistv5
Published
2025-03-17 22:34
Modified
2025-03-17 22:34
Severity ?
EPSS score ?
3.10%
(0.85685)
Summary
This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6.0 of Confluence Data Center and Server. With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact to confidentiality, no impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14 Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1 Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ]). This vulnerability was reported via our Bug Bounty program.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Confluence Data Center |
Version: >= 5.6.0 |
||||||
|
{ containers: { cna: { affected: [ { product: "Confluence Data Center", vendor: "Atlassian", versions: [ { status: "unaffected", version: "< 5.6.0", }, { status: "affected", version: ">= 5.6.0", }, { status: "unaffected", version: ">= 7.19.13", }, { status: "unaffected", version: ">= 7.19.14", }, { status: "unaffected", version: ">= 8.5.1", }, { status: "unaffected", version: ">= 8.6.0", }, ], }, { product: "Confluence Server", vendor: "Atlassian", versions: [ { status: "unaffected", version: "< 5.6.0", }, { status: "affected", version: ">= 5.6.0", }, { status: "unaffected", version: ">= 7.19.13", }, { status: "unaffected", version: ">= 7.19.14", }, { status: "unaffected", version: ">= 8.5.1", }, { status: "unaffected", version: ">= 8.6.0", }, ], }, ], descriptions: [ { lang: "en", value: "This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6.0 of Confluence Data Center and Server. With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact to confidentiality, no impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14 Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1 Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ]). This vulnerability was reported via our Bug Bounty program.", }, ], metrics: [ { cvssV3_0: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { description: "DoS (Denial of Service)", lang: "en", type: "DoS (Denial of Service)", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-17T22:34:42.950Z", orgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", shortName: "atlassian", }, references: [ { url: "https://confluence.atlassian.com/pages/viewpage.action?pageId=1283691616", }, { url: "https://jira.atlassian.com/browse/CONFSERVER-91258", }, ], }, }, cveMetadata: { assignerOrgId: "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", assignerShortName: "atlassian", cveId: "CVE-2023-22512", datePublished: "2025-03-17T22:34:42.950Z", dateReserved: "2023-01-01T00:01:22.330Z", dateUpdated: "2025-03-17T22:34:42.950Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2023-22512\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2024-01-16T18:15:09.130\",\"lastModified\":\"2025-03-17T23:15:16.143\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6.0 of Confluence Data Center and Server. With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact to confidentiality, no impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14 Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1 Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ]). This vulnerability was reported via our Bug Bounty program.\"},{\"lang\":\"es\",\"value\":\"Esta vulnerabilidad de denegación de servicio (DoS) de alta gravedad se introdujo en la versión 5.6.0 de Confluence Data Center and Server. Con una puntuación CVSS de 7,5, permite a un atacante no autenticado provocar la indisponibilidad de un recurso para sus usuarios previstos mediante la interrupción temporal o indefinida de los servicios de un host vulnerable (instancia de Confluence) conectado a una red. Esto no afecta a la confidencialidad ni a la integridad, tiene un alto impacto en la disponibilidad y no requiere la interacción del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la última versión. Si no pueden hacerlo, actualicen su instancia a una de las versiones corregidas compatibles especificadas: Confluence Data Center y Server 7.19: actualice a una versión mayor o igual a la 7.19.14 Confluence Data Center y Server 8.5: actualice a una versión mayor o igual a la 8.5.1 Confluence Data Center y Server 8.6 o posterior: no es necesario actualizar, ya tienen una versión parcheada Consulte las notas de la versión (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). Puede descargar la última versión de Confluence Data Center y Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives ]). Esta vulnerabilidad se informó a través de nuestro programa Bug Bounty.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@atlassian.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"references\":[{\"url\":\"https://confluence.atlassian.com/pages/viewpage.action?pageId=1283691616\",\"source\":\"security@atlassian.com\"},{\"url\":\"https://jira.atlassian.com/browse/CONFSERVER-91258\",\"source\":\"security@atlassian.com\"}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.