CVE Vulnerabilities

CVE-2023-22522

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Dec 06, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details

Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
Confluence_data_centerAtlassian4.0 (including)7.19.17 (excluding)
Confluence_data_centerAtlassian8.0.0 (including)8.4.5 (excluding)
Confluence_data_centerAtlassian8.5.0 (including)8.5.4 (excluding)
Confluence_data_centerAtlassian8.6.0 (including)8.6.2 (excluding)
Confluence_data_centerAtlassian8.7.0 (including)8.7.0 (including)
Confluence_serverAtlassian4.0 (including)7.19.17 (excluding)
Confluence_serverAtlassian8.0.0 (including)8.4.5 (excluding)
Confluence_serverAtlassian8.5.0 (including)8.5.4 (excluding)

Potential Mitigations

References