Wednesday, April 9, 2025
HomeCVE/vulnerabilityCritical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

Published on

SIEM as a Service

Follow Us on Google News

The widely used team workspace corporate wiki Confluence has been discovered to have a critical remote code execution vulnerability.

This vulnerability has been assigned with CVE-2024-21683 with a severity of 8.3 (High). 

This vulnerability affects multiple versions of Confluence Data Center and server, including Data Center version 8.9.0 and Server versions 8.5.0 through 8.5.8 LTS.

- Advertisement - Google News

However, this vulnerability has been fixed in the latest versions of Confluence Data Center and Server.

Atlassian Internal discovered this vulnerability, and it has been fixed accordingly.

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

Technical Analysis –  CVE-2024-21683

According to the advisory, this vulnerability allows an authenticated attacker to execute arbitrary code in the system that could result in high impact in the CIA (Confidentiality, Integrity and Availability).

Further, this vulnerability does not require any user interaction to be successful.

Atlassian has published no other information about this vulnerability.

However, depending on the description, it can be speculated that this vulnerability was easier for an authenticated attacker to exploit.

The complete details and a proof-of-concept for this vulnerability are yet to be published.

Atlassian recommends its users upgrade their Data Centers and Servers to the latest versions below.

Data Center

Affected versionsFixed versions
8.9.08.9.1
from 8.8.0 to 8.8.18.9.1
from 8.7.0 to 8.7.28.9.1
from 8.6.0 to 8.6.28.9.1
from 8.5.0 to 8.5.8 LTS8.9.1 or 8.5.9 LTS recommended
from 8.4.0 to 8.4.58.9.1 or 8.5.9 LTS recommended
from 8.3.0 to 8.3.48.9.1 or 8.5.9 LTS recommended
from 8.2.0 to 8.2.38.9.1 or 8.5.9 LTS recommended
from 8.1.0 to 8.1.48.9.1 or 8.5.9 LTS recommended
from 8.0.0 to 8.0.48.9.1 or 8.5.9 LTS recommended
from 7.20.0 to 7.20.38.9.1 or 8.5.9 LTS recommended
from 7.19.0 to 7.19.21 LTS8.9.1 or 8.5.9 LTS recommended or 7.19.22 LTS
from 7.18.0 to 7.18.38.9.1 or 8.5.9 LTS recommended or 7.19.22 LTS
from 7.17.0 to 7.17.58.9.1 or 8.5.9 LTS recommended or 7.19.22 LTS
Any earlier versions8.9.1 or 8.5.9 LTS recommended or 7.19.22 LTS

Server

Affected versionsFixed versions
from 8.5.0 to 8.5.8 LTS8.5.9 LTS recommended
from 8.4.0 to 8.4.58.5.9 LTS recommended
from 8.3.0 to 8.3.48.5.9 LTS recommended
from 8.2.0 to 8.2.38.5.9 LTS recommended
from 8.1.0 to 8.1.48.5.9 LTS recommended
from 8.0.0 to 8.0.48.5.9 LTS recommended
from 7.20.0 to 7.20.38.5.9 LTS recommended
from 7.19.0 to 7.19.21 LTS8.5.9 LTS recommended or 7.19.22 LTS
from 7.18.0 to 7.18.38.5.9 LTS recommended or 7.19.22 LTS
from 7.17.0 to 7.17.58.5.9 LTS recommended or 7.19.22 LTS
Any earlier versions8.5.9 LTS recommended or 7.19.22 LTS

Users of Confluence are advised to upgrade to the latest versions to prevent the exploitation of these vulnerabilities by threat actors.

ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...