Lucene search

K

CVE-2024-21683

🗓️ 21 May 2024 23:07:15Reported by atlassianType 
cve
 cve
🔗 web.nvd.nist.gov📰️ 23 Media mentions👁 418 Views🌐 WEB

High severity RCE vulnerability in Confluence 5.2, requires immediate patchin

Show more
Related
Affected
Refs
Paths
Social
ReporterTitlePublishedViews
Family
GithubExploit
Exploit for CVE-2024-21683
4 Jun 202412:00
githubexploit
GithubExploit
Exploit for CVE-2024-21683
23 May 202409:05
githubexploit
GithubExploit
Exploit for CVE-2024-21683
27 May 202411:14
githubexploit
GithubExploit
Exploit for CVE-2024-21683
29 Nov 202413:27
githubexploit
Metasploit
Atlassian Confluence Administrator Code Macro Remote Code Execution
9 Jul 202419:19
metasploit
NVD
CVE-2024-21683
21 May 202423:15
nvd
RedhatCVE
CVE-2024-21683
15 Mar 202507:37
redhatcve
Cvelist
CVE-2024-21683
21 May 202423:00
cvelist
Tenable Nessus
Atlassian Confluence 5.2 < 7.19.22 / 7.20.x < 8.5.9 / 8.6.x < 8.9.1 RCE (CONFSERVER-95832)
24 May 202400:00
nessus
Nuclei
Atlassian Confluence Data Center and Server - Remote Code Execution
24 May 202421:22
nuclei
Rows per page
[
  {
    "vendor": "Atlassian",
    "product": "Confluence Data Center",
    "versions": [
      {
        "version": "8.9.0",
        "status": "affected"
      },
      {
        "version": "8.8.0 to 8.8.1",
        "status": "affected"
      },
      {
        "version": "8.7.1 to 8.7.2",
        "status": "affected"
      },
      {
        "version": "8.6.0 to 8.6.2",
        "status": "affected"
      },
      {
        "version": "8.5.0 to 8.5.8",
        "status": "affected"
      },
      {
        "version": "8.4.0 to 8.4.5",
        "status": "affected"
      },
      {
        "version": "8.3.0 to 8.3.4",
        "status": "affected"
      },
      {
        "version": "8.2.0 to 8.2.3",
        "status": "affected"
      },
      {
        "version": "8.1.0 to 8.1.4",
        "status": "affected"
      },
      {
        "version": "8.0.0 to 8.0.4",
        "status": "affected"
      },
      {
        "version": "7.20.0 to 7.20.3",
        "status": "affected"
      },
      {
        "version": "7.19.0 to 7.19.21",
        "status": "affected"
      },
      {
        "version": "8.9.1 to 8.9.2",
        "status": "unaffected"
      },
      {
        "version": "8.5.9 to 8.5.10",
        "status": "unaffected"
      },
      {
        "version": "7.19.22 to 7.19.23",
        "status": "unaffected"
      }
    ]
  }
]
ParameterPositionPathDescriptionCWE
atl_tokenbinary/admin/plugins/newcode/addlanguage.actionThis endpoint allows an authenticated admin user to upload a malicious JavaScript file that could execute arbitrary commands on the server.CWE-20
languageFilebinary/admin/plugins/newcode/addlanguage.actionThis endpoint allows an authenticated admin user to upload a malicious JavaScript file that could execute arbitrary commands on the server.CWE-20
newLanguageNamebinary/admin/plugins/newcode/addlanguage.actionThis endpoint allows an authenticated admin user to upload a malicious JavaScript file that could execute arbitrary commands on the server.CWE-20
os_usernamerequest body/dologin.actionThis endpoint is used for logging in to the Confluence application, allowing an attacker to authenticate before exploiting the RCE vulnerability.
os_passwordrequest body/dologin.actionThis endpoint is used for logging in to the Confluence application, allowing an attacker to authenticate before exploiting the RCE vulnerability.

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo