Skip to content

Atlassian Confluence Data Center Known Exploited Vulnerabilities - 20240130002

Overview

The WA SOC has been made aware of a Proof of Concept (PoC) exploit code available for Confluence Data Center and Server SSTI (Server Side Template Injection) vulnerability.

What is vulnerable?

Product(s) Affected Affected Version(s) Summary Severity CVSS
Confluence Data Center and Server
8.0.x,
8.1.x,
8.2.x,
8.3.x,
8.4.x,
8.5.0-8.5.3
A template injection vulnerability on out-of-date versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected version. Customers using an affected version must take immediate action. Critical 9.8

Note: 7.19.x LTS versions are not affected by this vulnerability

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

Immediately patch to the latest version

If you are on an out-of-date version, you must immediately patch. Atlassian recommends that you patch each of your affected installations to the latest version available. The listed Fixed Versions are no longer the most up-to-date and do not protect your instance from other non-critical vulnerabilities as outlined in Atlassian’s January Security Bulletin.

Product Fixed Versions Latest Versions
Confluence Data Center and Server 8.5.4 (LTS) 8.5.5 (LTS)
Confluence Data Center 8.6.0 (Data Center Only)
8.7.1 (Data Center Only)
8.7.2 (Data Center Only)

Mitigations

There are no known workarounds. To remediate this vulnerability, update each affected product installation to the latest version.

Additional References