In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
Published: 2022-06-03
A critical vulnerability in Atlassian Confluence Server and Data Center has been exploited in the wild by multiple threat actors. Organizations should review and implement mitigation guidance until a patch becomes available.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a
https://www.theregister.com/2024/09/05/uncle_sam_charges_russian_gru/
https://securelist.com/vulnerability-report-q1-2024/112554/
https://thehackernews.com/2024/03/hackers-exploit-misconfigured-yarn.html
https://isc.sans.edu/diary/rss/30704
https://meterpreter.org/linux-windows-users-beware-8220-gangs-crypto-assault/
https://www.greynoise.io/blog/spike-in-atlassian-exploitation-attempts-patching-is-crucial
https://www.imperva.com/blog/imperva-detects-undocumented-8220-gang-activities/?web_view=true
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://thehackernews.com/2023/03/from-ransomware-to-cyber-espionage-55.html
https://www.mandiant.com/resources/blog/zero-days-exploited-2022
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://www.aquasec.com/blog/8220-gang-confluence-vulnerability-cve-2022-26134/
https://www.tenable.com/cyber-exposure/a-look-inside-the-ransomware-ecosystem
https://jira.atlassian.com/browse/CONFSERVER-79016
https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html
http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html
Published: 2022-06-03
Updated: 2025-02-09
Named Vulnerability: Confluence Server and Data Center Unauthenticated Remote Code ExecutionNamed Vulnerability: Atlassian ConfluenceKnown Exploited Vulnerability (KEV)
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94426
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored