vendor:
Confluence Data Center
by:
h3v0x
9.8
CVSS
CRITICAL
Remote Code Execution (RCE)
78
CWE
Product Name: Confluence Data Center
Affected Version From: All < 7.4.17 versions before 7.18.1
Affected Version To: 7.18.0
Patch Exists: YES
Related CWE: CVE-2022-26134
CPE: a:atlassian:confluence_data_center
Tags: packetstorm,cve,cve2022,confluence,rce,ognl,oast,kev
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://attackerkb.com/topics/BH1D56ZEhs/cve-2022-26134/rapid7-analysis, https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html, https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/, https://jira.atlassian.com/browse/CONFSERVER-79016, http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html
Nuclei Metadata: {'max-request': 2, 'shodan-query': 'http.component:"Atlassian Confluence"', 'verified': True, 'vendor': 'atlassian', 'product': 'confluence_data_center'}
Platforms Tested:
2022
Confluence Data Center 7.18.0 – Remote Code Execution (RCE)
Confluence Data Center 7.18.0 is vulnerable to Remote Code Execution (RCE). An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This vulnerability is due to improper validation of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application.
Mitigation:
Upgrade to Confluence Data Center 7.18.1 or later.