Tuesday, June 25, 2024

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

The widely used team workspace corporate wiki Confluence has been discovered to have a critical remote code execution vulnerability.

This vulnerability has been assigned with CVE-2024-21683 with a severity of 8.3 (High). 

This vulnerability affects multiple versions of Confluence Data Center and server, including Data Center version 8.9.0 and Server versions 8.5.0 through 8.5.8 LTS.

However, this vulnerability has been fixed in the latest versions of Confluence Data Center and Server.

Atlassian Internal discovered this vulnerability, and it has been fixed accordingly.

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

Technical Analysis –  CVE-2024-21683

According to the advisory, this vulnerability allows an authenticated attacker to execute arbitrary code in the system that could result in high impact in the CIA (Confidentiality, Integrity and Availability).

Further, this vulnerability does not require any user interaction to be successful.

Atlassian has published no other information about this vulnerability.

However, depending on the description, it can be speculated that this vulnerability was easier for an authenticated attacker to exploit.

The complete details and a proof-of-concept for this vulnerability are yet to be published.

Atlassian recommends its users upgrade their Data Centers and Servers to the latest versions below.

Data Center

Affected versionsFixed versions
8.9.08.9.1
from 8.8.0 to 8.8.18.9.1
from 8.7.0 to 8.7.28.9.1
from 8.6.0 to 8.6.28.9.1
from 8.5.0 to 8.5.8 LTS8.9.1 or 8.5.9 LTS recommended
from 8.4.0 to 8.4.58.9.1 or 8.5.9 LTS recommended
from 8.3.0 to 8.3.48.9.1 or 8.5.9 LTS recommended
from 8.2.0 to 8.2.38.9.1 or 8.5.9 LTS recommended
from 8.1.0 to 8.1.48.9.1 or 8.5.9 LTS recommended
from 8.0.0 to 8.0.48.9.1 or 8.5.9 LTS recommended
from 7.20.0 to 7.20.38.9.1 or 8.5.9 LTS recommended
from 7.19.0 to 7.19.21 LTS8.9.1 or 8.5.9 LTS recommended or 7.19.22 LTS
from 7.18.0 to 7.18.38.9.1 or 8.5.9 LTS recommended or 7.19.22 LTS
from 7.17.0 to 7.17.58.9.1 or 8.5.9 LTS recommended or 7.19.22 LTS
Any earlier versions8.9.1 or 8.5.9 LTS recommended or 7.19.22 LTS

Server

Affected versionsFixed versions
from 8.5.0 to 8.5.8 LTS8.5.9 LTS recommended
from 8.4.0 to 8.4.58.5.9 LTS recommended
from 8.3.0 to 8.3.48.5.9 LTS recommended
from 8.2.0 to 8.2.38.5.9 LTS recommended
from 8.1.0 to 8.1.48.5.9 LTS recommended
from 8.0.0 to 8.0.48.5.9 LTS recommended
from 7.20.0 to 7.20.38.5.9 LTS recommended
from 7.19.0 to 7.19.21 LTS8.5.9 LTS recommended or 7.19.22 LTS
from 7.18.0 to 7.18.38.5.9 LTS recommended or 7.19.22 LTS
from 7.17.0 to 7.17.58.5.9 LTS recommended or 7.19.22 LTS
Any earlier versions8.5.9 LTS recommended or 7.19.22 LTS

Users of Confluence are advised to upgrade to the latest versions to prevent the exploitation of these vulnerabilities by threat actors.

ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service

Website

Latest articles

Hackers Attacking Windows IIS Server to Upload Web Shells

Windows IIS Servers often host critical web applications and services that provide a gateway...

WikiLeaks Founder Julian Assange Released in Stunning Deal with U.S.

WikiLeaks founder Julian Assange has been released from prison after reaching a deal with...

Four Members of FIN9 Hackers Charged for Attacking U.S. Companies

Four Vietnamese nationals have been charged for their involvement in a series of computer...

BREAKING: NHS England’s Synnovis Hit by Massive Cyber Attack

In a shocking development, the NHS has revealed that it was the victim of...

Threat Actor Claiming a 0-day in Linux LPE Via GRUB bootloader

A new threat actor has emerged, claiming a zero-day vulnerability in the Linux GRUB...

LockBit Ransomware Group Claims Hack of US Federal Reserve

The notorious LockBit ransomware group has claimed responsibility for hacking the U.S. Federal Reserve,...

Microsoft Power BI Vulnerability Let Attackers Access Organizations Sensitive Data

A vulnerability in Microsoft Power BI allows unauthorized users to access sensitive data underlying...
Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles