VMware and Atlassian today disclosed critical vulnerabilities and, while neither appear to have been exploited by miscreants yet, admins should patch now to avoid disappointment.
Most serious is CVE-2023-22527, a template injection flaw that can allow unauthenticated remote code execution attacks.
It scored a perfect CVSS rating of 10 out of 10 and affects Confluence Data Center and Server 8 versions released before December 5, 2023 and 8.4.5, which no longer receives fixes.
Atlassian also released fixes for a high-severity flaw was found in the FasterXML Jackson Databind code used in versions 8.20.0, 9.4.0, 9.5.0, and 9.6.0 of Jira Software Data Center and Server.
The 7.5-rated bug, tracked as CVE-2020-25649, could allow XML external entity attacks in which miscreants could mess with data integrity.
So in addition to updating Confluence, it's also a good idea to upgrade to the latest version of Jira Software Data Center and Server, the collaboration biz advises.
Moving on to the critical VMware bug, CVE-2023-34063.
This one is a missing access control problem in all versions of Aria Automation earlier of 8.16.
Be aware that this infrastructure automation product may be included in VMware Cloud Foundation.
The bug earned a 9.9 CVSS rating, and VMware warns that successful exploitation can allow unauthorized access to remote organizations and workflows.
Luckily this one also has a fix, so upgrade to VMware Aria Automation 8.16, and then apply the patch.
This Cyber News was published on go.theregister.com. Publication date: Tue, 16 Jan 2024 18:43:04 +0000