High severity RCE vulnerability in Confluence 5.2, requires immediate patchin
Reporter | Title | Published | Views | Family All 15 |
---|---|---|---|---|
![]() | Exploit for CVE-2024-21683 | 4 Jun 202412:00 | – | githubexploit |
![]() | Exploit for CVE-2024-21683 | 23 May 202409:05 | – | githubexploit |
![]() | Exploit for CVE-2024-21683 | 27 May 202411:14 | – | githubexploit |
![]() | Exploit for CVE-2024-21683 | 29 Nov 202413:27 | – | githubexploit |
![]() | Atlassian Confluence Administrator Code Macro Remote Code Execution | 9 Jul 202419:19 | – | metasploit |
![]() | CVE-2024-21683 | 21 May 202423:15 | – | nvd |
![]() | CVE-2024-21683 | 15 Mar 202507:37 | – | redhatcve |
![]() | CVE-2024-21683 | 21 May 202423:00 | – | cvelist |
![]() | Atlassian Confluence 5.2 < 7.19.22 / 7.20.x < 8.5.9 / 8.6.x < 8.9.1 RCE (CONFSERVER-95832) | 24 May 202400:00 | – | nessus |
![]() | Atlassian Confluence Data Center and Server - Remote Code Execution | 24 May 202421:22 | – | nuclei |
[
{
"vendor": "Atlassian",
"product": "Confluence Data Center",
"versions": [
{
"version": "8.9.0",
"status": "affected"
},
{
"version": "8.8.0 to 8.8.1",
"status": "affected"
},
{
"version": "8.7.1 to 8.7.2",
"status": "affected"
},
{
"version": "8.6.0 to 8.6.2",
"status": "affected"
},
{
"version": "8.5.0 to 8.5.8",
"status": "affected"
},
{
"version": "8.4.0 to 8.4.5",
"status": "affected"
},
{
"version": "8.3.0 to 8.3.4",
"status": "affected"
},
{
"version": "8.2.0 to 8.2.3",
"status": "affected"
},
{
"version": "8.1.0 to 8.1.4",
"status": "affected"
},
{
"version": "8.0.0 to 8.0.4",
"status": "affected"
},
{
"version": "7.20.0 to 7.20.3",
"status": "affected"
},
{
"version": "7.19.0 to 7.19.21",
"status": "affected"
},
{
"version": "8.9.1 to 8.9.2",
"status": "unaffected"
},
{
"version": "8.5.9 to 8.5.10",
"status": "unaffected"
},
{
"version": "7.19.22 to 7.19.23",
"status": "unaffected"
}
]
}
]
Source | Link |
---|---|
jira | www.jira.atlassian.com/browse/CONFSERVER-95832 |
confluence | www.confluence.atlassian.com/pages/viewpage.action |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
atl_token | binary | /admin/plugins/newcode/addlanguage.action | This endpoint allows an authenticated admin user to upload a malicious JavaScript file that could execute arbitrary commands on the server. | CWE-20 |
languageFile | binary | /admin/plugins/newcode/addlanguage.action | This endpoint allows an authenticated admin user to upload a malicious JavaScript file that could execute arbitrary commands on the server. | CWE-20 |
newLanguageName | binary | /admin/plugins/newcode/addlanguage.action | This endpoint allows an authenticated admin user to upload a malicious JavaScript file that could execute arbitrary commands on the server. | CWE-20 |
os_username | request body | /dologin.action | This endpoint is used for logging in to the Confluence application, allowing an attacker to authenticate before exploiting the RCE vulnerability. | |
os_password | request body | /dologin.action | This endpoint is used for logging in to the Confluence application, allowing an attacker to authenticate before exploiting the RCE vulnerability. |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo