A max-critical unauthenticated remote code execution vulnerability is impacting Atlassian Confluence Data Center and Confluence Server, in all versions released before Dec. 5.
Unpatched organizations should prepare to defend against everything from ransomware campaigns to cyber-espionage attempts.
The bug, which carries a 10 out of 10 vulnerability-severity rating on the CVSS v3 scale, is a template injection vulnerability that paves the way for unauthenticated attackers to achieve RCE on versions 8.0.x, 8.1.x, 8.2.x, 8.3.x, 8.4.x, and 8.5.0 through 8.5.3.
Bug Plagues Most Versions of Confluence Any organization that has upgraded to Confluence versions released in the company's December update are in the clear, though the bug was disclosed just today, along with several less-severe vulnerabilities that are newly patched in a fresh security bulletin.
Atlassian noted that end-of-life instances are also affected and will not receive patches.
There are no mitigations or workarounds available, so admins should apply the latest versions from last month to be fully protected, even if their versions of Confluence aren't exposed to the Internet.
For those who can't immediately patch their Confluence Data Center and Server instances, Atlassian recommends they remove their systems from the Internet and back up their data outside of the Confluence environment.
Another 10-out-of-10 critical bug in November was swarmed with exploitation attempts within days of its disclosure, and it's likely the same will hold true for this one if past is prologue; with Atlassian, it usually is.
This Cyber News was published on www.darkreading.com. Publication date: Tue, 16 Jan 2024 18:10:05 +0000