Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-22526
HistoryJan 16, 2024 - 5:15 a.m.

Remote code execution

2024-01-1605:15:00
PRIOn knowledge base
www.prio-n.com
4
remote code execution
confluence data center
cvss score 7.2
high impact
atlassian
upgrade
fixed versions
release notes
bug bounty program
nvd

7.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.6%

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 7.19.0 of Confluence Data Center.

This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.

Atlassian recommends that Confluence Data Center customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Confluence Data Center and Server 7.19: Upgrade to a release 7.19.17, or any higher 7.19.x release
Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release
Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release

See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html]). You can download the latest version of Confluence Data Center from the download center ([https://www.atlassian.com/software/confluence/download-archives]).

This vulnerability was discovered by m1sn0w and reported via our Bug Bounty program

7.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.6%

Related for PRION:CVE-2023-22526