gsd-2023-22515
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2023-22515",
    "id": "GSD-2023-22515"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-22515"
      ],
      "details": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. ",
      "id": "GSD-2023-22515",
      "modified": "2023-12-13T01:20:42.624654Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security@atlassian.com",
        "ID": "CVE-2023-22515",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Confluence Data Center",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "versions": [
                              {
                                "status": "unaffected",
                                "version": "\u003c 8.0.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.0.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.0.1"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.0.2"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.0.3"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.1.3"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.1.4"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.2.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.2.1"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.2.2"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.2.3"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.3.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.3.1"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.3.2"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.4.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.4.1"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.4.2"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.5.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.5.1"
                              },
                              {
                                "status": "unaffected",
                                "version": "\u003e= 8.3.3"
                              },
                              {
                                "status": "unaffected",
                                "version": "\u003e= 8.4.3"
                              },
                              {
                                "status": "unaffected",
                                "version": "\u003e= 8.5.2"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Confluence Server",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "versions": [
                              {
                                "status": "unaffected",
                                "version": "\u003c 8.0.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.0.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.0.1"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.0.2"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.0.3"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.1.3"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.1.4"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.2.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.2.1"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.2.2"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.2.3"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.3.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.3.1"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.3.2"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.4.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.4.1"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.4.2"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.5.0"
                              },
                              {
                                "status": "affected",
                                "version": "\u003e= 8.5.1"
                              },
                              {
                                "status": "unaffected",
                                "version": "\u003e= 8.3.3"
                              },
                              {
                                "status": "unaffected",
                                "version": "\u003e= 8.4.3"
                              },
                              {
                                "status": "unaffected",
                                "version": "\u003e= 8.5.2"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Atlassian"
            }
          ]
        }
      },
      "credits": [
        {
          "lang": "en",
          "value": "an Atlassian customer"
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. "
          }
        ]
      },
      "impact": {
        "cvss": [
          {
            "baseScore": 10,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "BASM (Broken Authentication \u0026 Session Management)"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html",
            "refsource": "MISC",
            "url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
          },
          {
            "name": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515",
            "refsource": "MISC",
            "url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
          },
          {
            "name": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276",
            "refsource": "MISC",
            "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
          },
          {
            "name": "https://jira.atlassian.com/browse/CONFSERVER-92475",
            "refsource": "MISC",
            "url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "cisaActionDue": "2023-10-13",
        "cisaExploitAdd": "2023-10-05",
        "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.",
        "cisaVulnerabilityName": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability",
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "85B2AD9F-CBA6-4559-9AE3-5F76A9EC3B7F",
                    "versionEndExcluding": "8.3.3",
                    "versionStartIncluding": "8.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "38F9918D-6848-4CD6-8096-4FB48C23818B",
                    "versionEndExcluding": "8.4.3",
                    "versionStartIncluding": "8.4.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8D646BCF-214F-449D-AEEB-B253E8715394",
                    "versionEndExcluding": "8.5.2",
                    "versionStartIncluding": "8.5.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "970A3DA7-5114-4696-A93D-C3D5AFF5C6C5",
                    "versionEndExcluding": "8.3.3",
                    "versionStartIncluding": "8.0.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A2EB19CD-AE29-4775-91C5-05B01A96AC6C",
                    "versionEndExcluding": "8.4.3",
                    "versionStartIncluding": "8.4.0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "79229BE7-0AA0-4308-8BB2-8FB11E8B9AD7",
                    "versionEndExcluding": "8.5.2",
                    "versionStartIncluding": "8.5.0",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. "
          },
          {
            "lang": "es",
            "value": "Atlassian ha sido informado de un problema informado por un pu\u00f1ado de clientes en el que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center and Server de acceso p\u00fablico para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema."
          }
        ],
        "id": "CVE-2023-22515",
        "lastModified": "2024-02-16T17:52:35.420",
        "metrics": {
          "cvssMetricV30": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 10.0,
                "baseSeverity": "CRITICAL",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "CHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
                "version": "3.0"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 6.0,
              "source": "security@atlassian.com",
              "type": "Secondary"
            }
          ],
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 9.8,
                "baseSeverity": "CRITICAL",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 3.9,
              "impactScore": 5.9,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2023-10-04T14:15:10.440",
        "references": [
          {
            "source": "security@atlassian.com",
            "tags": [
              "Exploit",
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
          },
          {
            "source": "security@atlassian.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
          },
          {
            "source": "security@atlassian.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
          },
          {
            "source": "security@atlassian.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
          }
        ],
        "sourceIdentifier": "security@atlassian.com",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "NVD-CWE-noinfo"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.