Atlassian Confluence 6.1.x < 7.13.20 Remote Code Execution

high Web App Scanning Plugin ID 113983

Synopsis

Atlassian Confluence 6.1.x < 7.13.20 Remote Code Execution

Description

According to its self-reported version number, the Atlassian Confluence application running on the remote host is 6.1.0 prior to 7.13.20, 6.1.0 prior to 7.19.8 or 6.1.0 prior to 8.2.0. It is, therefore, affected by a Remote Code Execution flaw which permits remote attackers to execute arbitary code without user interaction.

Solution

Upgrade to Atlassian Confluence LTS bugfix versions 7.13.20, 7.19.8 or 8.2.0 or later.

See Also

https://jira.atlassian.com/browse/CONFSERVER-88221

Plugin Details

Severity: High

ID: 113983

Type: remote

Published: 8/1/2023

Updated: 8/2/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-22508

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2023-22508

Vulnerability Information

CPE: cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Patch Publication Date: 7/18/2023

Vulnerability Publication Date: 6/26/2023

Reference Information

CVE: CVE-2023-22508