Skip to content

Improper Authorization Vulnerability In Confluence Data Center and Server - 20231101002

Overview

Atlassian has announced a vulnerability in Confluence Data Center and Server solutions.

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

What is the vulnerability?

CVE-2023-22518 - CVSS v3 Base Score: 9.1 - Improper Authorization

What is vulnerable?

The vulnerability affects the following products:

  • All versions of Confluence Data Center and Confluence Server

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

  • Atlassian recommends that you upgrade your instance to one of the versions listed in the "Fixed Versions" table section. For full descriptions of the above versions of Confluence Data Center and Server, see the release notes. You can download the latest version of Confluence Data Center and Server from the download center.
Product Fixed Versions
Confluence Data Center
Confluence Server
7.19.16 or later
8.3.4 or later
8.4.4 or later
8.5.3 or later
8.6.1 or later

Additional Mitigations are listed in the Atlassian's Jira ticket for the vulnerability found here.

Additional References