Lucene search

K
nvd[email protected]NVD:CVE-2023-22522
HistoryDec 06, 2023 - 5:15 a.m.

CVE-2023-22522

2023-12-0605:15:09
CWE-74
web.nvd.nist.gov
template injection
unsafe user input
confluence
remote code execution
rce
atlassian cloud
confluence data center
confluence server
atlassian hosting

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

44.2%

This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details

Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Affected configurations

NVD
Node
atlassianconfluence_data_centerRange4.07.19.17
OR
atlassianconfluence_data_centerRange8.0.08.4.5
OR
atlassianconfluence_data_centerRange8.5.08.5.4
OR
atlassianconfluence_data_centerRange8.6.08.6.2
OR
atlassianconfluence_data_centerMatch8.7.0
OR
atlassianconfluence_serverRange4.07.19.17
OR
atlassianconfluence_serverRange8.0.08.4.5
OR
atlassianconfluence_serverRange8.5.08.5.4

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

44.2%