Atlassian Confluence 2.x >= 2.7 / 3.x < 3.4.9 Multiple XSS

This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.


Synopsis :

The remote web application is affected by multiple cross-site
scripting vulnerabilities.

Description :

According to its self-reported version number, the instance of
Atlassian Confluence on the remote host is a 2.x version that is 2.7
or later, or else version 3.x prior to 3.4.9. It is, therefore,
affected by multiple cross-site scripting vulnerabilities.

Errors in the validation of input data to certain macros allow
unfiltered data to be returned to a user's browser. The affected
macros are: Include Page, Activity Stream, Action links of attachments
lists and Table of Contents.

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

See also :

http://www.nessus.org/u?258e5e82
https://jira.atlassian.com/browse/CONF-21604
https://jira.atlassian.com/browse/CONF-21606
https://jira.atlassian.com/browse/CONF-21766
https://jira.atlassian.com/browse/CONF-21819

Solution :

Upgrade to Confluence version 3.4.9 or later, or apply the appropriate
vendor patch.

Risk factor :

Low / CVSS Base Score : 3.5
(CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N)
CVSS Temporal Score : 2.9
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 53576 ()

Bugtraq ID: 47398

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now