Atlassian Confluence 7.18.x < 7.18.1 Multiple Servlet Filter Vulnerabilities

critical Web App Scanning Plugin ID 113324

Synopsis

Atlassian Confluence 7.18.x < 7.18.1 Multiple Servlet Filter Vulnerabilities

Description

According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.4.17, 7.5.x prior to 7.13.7, 7.14.x prior to 7.14.3, 7.15.x prior to 7.15.2, 7.16.x prior to 7.16.4, 7.17.x prior to 7.17.4 or 7.18.0. It is, therefore, affected by the following vulnerabilities :

- An arbitrary servlet filter bypass vulnerability which can lead to authentication bypass or Cross-Site Scripting (XSS). A remote, unauthenticated attacker can bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. (CVE-2022-26136)

- An additional servlet filter invocation vulnerability which can lead to Cross-Origin Resource Sharing (CORS) bypass. A remote, unauthenticated attacker can cause additional Servlet Filters to be invoked when the application processes requests or responses. (CVE-2022-26137)

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Atlassian Confluence version 7.18.1 or later.

See Also

https://jira.atlassian.com/browse/CONFSERVER-79476

Plugin Details

Severity: Critical

ID: 113324

Type: remote

Published: 7/28/2022

Updated: 3/14/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-26136

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2022-26136

Vulnerability Information

CPE: cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Patch Publication Date: 7/20/2022

Vulnerability Publication Date: 7/5/2022

Reference Information

CVE: CVE-2022-26136, CVE-2022-26137

CWE: 180, 287, 346, 79

OWASP: 2010-A2, 2010-A3, 2010-A6, 2013-A2, 2013-A3, 2013-A5, 2013-A9, 2017-A2, 2017-A6, 2017-A7, 2017-A9, 2021-A3, 2021-A6, 2021-A7

WASC: Application Misconfiguration, Cross-Site Scripting, Insufficient Authentication

CAPEC: 111, 114, 115, 141, 142, 151, 160, 194, 209, 21, 22, 384, 385, 386, 387, 388, 510, 57, 588, 59, 591, 592, 593, 60, 63, 633, 650, 75, 76, 85, 89, 94

DISA STIG: APSC-DV-000460, APSC-DV-002490, APSC-DV-002560, APSC-DV-002630

HIPAA: 164.306(a)(1), 164.306(a)(2), 164.312(a)(1), 164.312(a)(2)(i)

ISO: 27001-A.10.1, 27001-A.13.1.1, 27001-A.14.1.2, 27001-A.14.1.3, 27001-A.14.2.5, 27001-A.18.1.3, 27001-A.6.2.2, 27001-A.9.1.2, 27001-A.9.4.1, 27001-A.9.4.4, 27001-A.9.4.5

NIST: sp800_53-AC-3, sp800_53-CM-6b, sp800_53-SI-10, sp800_53-SI-10(5)

OWASP API: 2019-API7, 2023-API8

OWASP ASVS: 4.0.2-14.2.1, 4.0.2-14.4.7, 4.0.2-5.3.3

PCI-DSS: 3.2-6.2, 3.2-6.5.10, 3.2-6.5.7, 3.2-6.5.8