1. Summary

Vulnerability Name

Atlassian Confluence Remote Code Execution Vulnerability (CVE-2023-22508)

Release Date

July 19, 2023

Component Name

Atlassian Confluence Data Center & Server

Affected Versions

Confluence Data Center & Server < 7.13.20
Confluence Data Center & Server < 7.19.8
Confluence Data Center & Server < 8.2.0

Vulnerability Type

Remote Code Execution Vulnerability

Severity

CVSS v3 Base Score: 8.5 (High)

Exploitability

Attack Vector: Network

Attack Complexity: High

Privileges Required: Low

User Interaction: None

Impact

Confidentiality Impact: High

Integrity Impact: High

Availability Impact: High

 

2. About the Vulnerability (CVE-2023-22508)

2.1 About the Component

Atlassian Confluence Data Center is a collaborative software solution designed to facilitate teamwork and knowledge sharing within organizations. It ensures high availability and scalability by employing a distributed architecture across multiple nodes and data centers, accommodating the needs of large enterprises.

Atlassian Confluence Server is collaboration and documentation software that allows teams to work together and share knowledge effectively within an organization. It is a self-hosted solution, meaning it runs on a single server and is suitable for small to mid-sized teams.

2.2 About the Vulnerability

On July 19, 2023, Sangfor FarSight Labs received notification of a remote code execution vulnerability in Atlassian Confluence Data Center and Server, identified as CVE-2023-22508, with a severity rating of High (CVSS Score 8.5).

This remote code execution (RCE) vulnerability allows an authenticated attacker to execute arbitrary code. It has a high impact on confidentiality, a high impact on integrity, a high impact on availability, and requires no user interaction.

3. Affected Versions

Confluence Data Center & Server < 7.13.20
Confluence Data Center & Server < 7.19.8
Confluence Data Center & Server < 8.2.0

4. Solutions

4.1 Atlassian Solution

4.1.1 Version Upgrade

Atlassian recommends that users upgrade to the latest version of Confluence Data Center/Server. Users who are unable to upgrade to the latest version are recommended to upgrade to the earliest fixed version: 8.2.0 (Feature Release), 7.19.8 (Long Term Support), or 7.13.20 (Long Term Support).

Link: https://www.atlassian.com/software/confluence/download-archives

5. Timeline

On July 19, 2023, Sangfor FarSight Labs received notification about the Atlassian Confluence Remote Code Execution Vulnerability (CVE-2023-22508).

On July 19, 2023, Sangfor FarSight Labs released a vulnerability alert.

6. Reference

https://jira.atlassian.com/browse/CONFSERVER-88221

https://nvd.nist.gov/vuln/detail/CVE-2023-22508

7. Learn More

Sangfor FarSight Labs researches the latest cyberthreats and unknown zero-day vulnerabilities, alerting customers to potential dangers to their organizations, and providing real-time solutions with actionable intelligence. Sangfor FarSight Labs works with other security vendors and the security community at large to identify and verify global cyberthreats, providing fast and easy protection for customers.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Name
Email Address
Business Phone Number
Tell us about your project requirements

Related Articles

CVE-2024-47575: Fortinet FortiManager Authentication Vulnerability

Date : 25 Oct 2024
Read Now

CVE-2024-38819: Path Traversal Vulnerability

Date : 19 Oct 2024
Read Now

CVE-2024-40766: SonicWALL SonicOS Access Control Flaw Vulnerability

Date : 12 Sep 2024
Read Now

See Other Product

Cyber Command - NDR Platform
Endpoint Secure
Internet Access Gateway (IAG)
Sangfor Network Secure - Next Generation Firewall
Platform-X
Sangfor Access Secure