vendor:
Confluence
by:
Mayank Deshmukh
5,3
CVSS
MEDIUM
Pre-Authorization Arbitrary File Read
200
CWE
Product Name: Confluence
Affected Version From: < 7.4.10
Affected Version To: 7.5.0 ≤ version < 7.12.3
Patch Exists: YES
Related CWE: CVE-2021-26085
CPE: a:atlassian:confluence
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=154244, https://www.infosecmatter.com/nessus-plugin-library/?id=153087, https://www.infosecmatter.com/nessus-plugin-library/?id=110771, https://www.infosecmatter.com/nessus-plugin-library/?id=128548, https://www.infosecmatter.com/nessus-plugin-library/?_page=14, https://www.infosecmatter.com/nessus-plugin-library/?id=124281, https://www.infosecmatter.com/nessus-plugin-library/?id=86721, https://www.infosecmatter.com/nessus-plugin-library/?id=124004, https://www.infosecmatter.com/nessus-plugin-library/?id=152864
Tags: kev,packetstorm,cve,cve2021,confluence,atlassian,lfi,intrusive
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Nuclei References:
https://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html, https://jira.atlassian.com/browse/CONFSERVER-67893, https://nvd.nist.gov/vuln/detail/CVE-2021-26085, http://packetstormsecurity.com/files/164401/Atlassian-Confluence-Server-7.5.1-Arbitrary-File-Read.html
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'http.component:"Atlassian Confluence"', 'vendor': 'atlassian', 'product': 'confluence_data_center'}
Platforms Tested: Kali Linux & Windows 10
2021
Atlassian Confluence 7.12.2 – Pre-Authorization Arbitrary File Read
Atlassian Confluence Server allows remote attackers to view restricted resources via local file inclusion in the /s/ endpoint.
Mitigation:
Upgrade to Confluence version 7.12.3 or later.