A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.
Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html | Exploit Third Party Advisory VDB Entry |
https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615 | Vendor Advisory |
https://jira.atlassian.com/browse/CONFSERVER-93833 | Issue Tracking Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: atlassian
Published: 2024-01-16T05:00:00.692Z
Updated: 2024-06-04T17:26:49.981Z
Reserved: 2023-01-01T00:01:22.333Z
Link: CVE-2023-22527
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-16T05:15:08.290
Modified: 2024-06-10T16:10:53.183
Link: CVE-2023-22527
JSON object: View
Redhat Information
No data.
CWE