CVE Vulnerabilities

CVE-2023-22522

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Dec 06, 2023 | Modified: Dec 11, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details

Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Confluence_data_center Atlassian 4.0 (including) 7.19.17 (excluding)
Confluence_data_center Atlassian 8.0.0 (including) 8.4.5 (excluding)
Confluence_data_center Atlassian 8.5.0 (including) 8.5.4 (excluding)
Confluence_data_center Atlassian 8.6.0 (including) 8.6.2 (excluding)
Confluence_data_center Atlassian 8.7.0 (including) 8.7.0 (including)
Confluence_server Atlassian 4.0 (including) 7.19.17 (excluding)
Confluence_server Atlassian 8.0.0 (including) 8.4.5 (excluding)
Confluence_server Atlassian 8.5.0 (including) 8.5.4 (excluding)

Potential Mitigations

References