Lucene search

K
cvelistAtlassianCVELIST:CVE-2023-22522
HistoryDec 06, 2023 - 5:00 a.m.

CVE-2023-22522

2023-12-0605:00:02
atlassian
www.cve.org
6
template injection
confluence
remote code execution
atlassian
data center
server
vulnerability

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.001

Percentile

44.0%

This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details

Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

CNA Affected

[
  {
    "vendor": "Atlassian",
    "product": "Confluence Data Center",
    "versions": [
      {
        "version": "< 4.0.0",
        "status": "unaffected"
      },
      {
        "version": ">= 4.0.0",
        "status": "affected"
      },
      {
        "version": ">= 7.20.0",
        "status": "affected"
      },
      {
        "version": ">= 8.0.0",
        "status": "affected"
      },
      {
        "version": ">= 8.6.0",
        "status": "affected"
      },
      {
        "version": ">= 7.19.17",
        "status": "unaffected"
      },
      {
        "version": ">= 8.4.5",
        "status": "unaffected"
      },
      {
        "version": ">= 8.5.4",
        "status": "unaffected"
      },
      {
        "version": ">= 8.6.2",
        "status": "unaffected"
      },
      {
        "version": ">= 8.7.1",
        "status": "unaffected"
      }
    ]
  },
  {
    "vendor": "Atlassian",
    "product": "Confluence Server",
    "versions": [
      {
        "version": "< 4.0.0",
        "status": "unaffected"
      },
      {
        "version": ">= 4.0.0",
        "status": "affected"
      },
      {
        "version": ">= 7.20.0",
        "status": "affected"
      },
      {
        "version": ">= 8.0.0",
        "status": "affected"
      },
      {
        "version": ">= 8.6.0",
        "status": "affected"
      },
      {
        "version": ">= 7.19.17",
        "status": "unaffected"
      },
      {
        "version": ">= 8.4.5",
        "status": "unaffected"
      },
      {
        "version": ">= 8.5.4",
        "status": "unaffected"
      },
      {
        "version": ">= 8.6.2",
        "status": "unaffected"
      },
      {
        "version": ">= 8.7.1",
        "status": "unaffected"
      }
    ]
  }
]

CVSS3

9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.001

Percentile

44.0%

Related for CVELIST:CVE-2023-22522