In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a
https://www.theregister.com/2024/09/05/uncle_sam_charges_russian_gru/
https://securelist.com/vulnerability-report-q1-2024/112554/
https://thehackernews.com/2024/03/hackers-exploit-misconfigured-yarn.html
https://isc.sans.edu/diary/rss/30704
https://meterpreter.org/linux-windows-users-beware-8220-gangs-crypto-assault/
https://www.greynoise.io/blog/spike-in-atlassian-exploitation-attempts-patching-is-crucial
https://www.imperva.com/blog/imperva-detects-undocumented-8220-gang-activities/?web_view=true
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://thehackernews.com/2023/03/from-ransomware-to-cyber-espionage-55.html
https://www.mandiant.com/resources/blog/zero-days-exploited-2022
https://www.tenable.com/cyber-exposure/tenable-2022-threat-landscape-report
https://www.aquasec.com/blog/8220-gang-confluence-vulnerability-cve-2022-26134/
https://www.tenable.com/cyber-exposure/a-look-inside-the-ransomware-ecosystem
https://jira.atlassian.com/browse/CONFSERVER-79016
https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html
http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html
Published: 2022-06-03
Updated: 2025-02-09
Known Exploited Vulnerability (KEV)
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94426
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored