跳转到帖子

Atlassian Confluence: Improper Neutralization of Special Elements in Output Used by a DownstreamComponent ('Injection') (CVE-2023-22522)

recommended_posts

发布于
  • Members

Atlassian Confluence: Improper Neutralization of Special Elements in Output Used by a DownstreamComponent ('Injection') (CVE-2023-22522)

Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
12/06/2023
Created
12/13/2023
Added
12/12/2023
Modified
01/28/2025

Description

This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Solution(s)

  • atlassian-confluence-upgrade-7_19_17
  • atlassian-confluence-upgrade-8_4_5
  • atlassian-confluence-upgrade-8_5_4
  • atlassian-confluence-upgrade-8_6_2
  • atlassian-confluence-upgrade-8_7_1

References

  • https://attackerkb.com/topics/cve-2023-22522
  • CVE - 2023-22522
  • 查看数 707
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…