All the vulnerabilites related to Atlassian - Confluence
cve-2017-18086
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-08-05 21:13
Severity ?
EPSS score ?
Summary
Various resources in Atlassian Confluence Server before version 6.4.2 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the issuesURL parameter.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-54907 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103061 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54907" }, { "name": "103061", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103061" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Various resources in Atlassian Confluence Server before version 6.4.2 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the issuesURL parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-20T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54907" }, { "name": "103061", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103061" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "ID": "CVE-2017-18086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Various resources in Atlassian Confluence Server before version 6.4.2 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the issuesURL parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-54907", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CONFSERVER-54907" }, { "name": "103061", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103061" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18086", "datePublished": "2018-02-02T14:00:00", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-08-05T21:13:48.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3395
Vulnerability from cvelistv5
Published
2019-03-25 18:37
Modified
2024-09-17 00:20
Severity ?
EPSS score ?
Summary
The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-57971 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence Server |
Version: unspecified < 6.6.7 Version: 6.7.0 < unspecified Version: unspecified < Version: 6.8.0 < unspecified Version: unspecified < 6.8.5 Version: 6.9.0 < unspecified Version: unspecified < 6.9.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:08.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-57971" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "6.6.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThanOrEqual": "6.7.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.8.0", "versionType": "custom" }, { "lessThan": "6.8.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.9.0", "versionType": "custom" }, { "lessThan": "6.9.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery." } ], "problemTypes": [ { "descriptions": [ { "description": "Server-Side Request Forgery (SSRF)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-25T18:37:06", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-57971" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-03-20T10:00:00", "ID": "CVE-2019-3395", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.6.7" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c=", "version_value": "6.7.3" }, { "version_affected": "\u003e=", "version_value": "6.8.0" }, { "version_affected": "\u003c", "version_value": "6.8.5" }, { "version_affected": "\u003e=", "version_value": "6.9.0" }, { "version_affected": "\u003c", "version_value": "6.9.3" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WebDAV endpoint in Atlassian Confluence Server and Data Center before version 6.6.7 (the fixed version for 6.6.x), from version 6.7.0 before 6.8.5 (the fixed version for 6.8.x), and from version 6.9.0 before 6.9.3 (the fixed version for 6.9.x) allows remote attackers to send arbitrary HTTP and WebDAV requests from a Confluence Server or Data Center instance via Server-Side Request Forgery." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Server-Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-57971", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-57971" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-3395", "datePublished": "2019-03-25T18:37:06.217310Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-17T00:20:30.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-20406
Vulnerability from cvelistv5
Published
2020-02-06 03:10
Modified
2024-09-16 23:21
Severity ?
EPSS score ?
Summary
The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code & escalate their privileges via a DLL hijacking vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-59428 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence Data Center |
Version: unspecified < 7.0.5 Version: 7.1.0 < unspecified Version: unspecified < 7.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:39:09.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-59428" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.0.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.1.0", "versionType": "custom" }, { "lessThan": "7.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code \u0026 escalate their privileges via a DLL hijacking vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "DLL Hijacking", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-06T03:10:28", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-59428" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2020-02-05T00:00:00", "ID": "CVE-2019-20406", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.0.5" }, { "version_affected": "\u003e=", "version_value": "7.1.0" }, { "version_affected": "\u003c", "version_value": "7.1.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The usage of Tomcat in Confluence on the Microsoft Windows operating system before version 7.0.5, and from version 7.1.0 before version 7.1.1 allows local system attackers who have permission to write a DLL file in a directory in the global path environmental variable variable to inject code \u0026 escalate their privileges via a DLL hijacking vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DLL Hijacking" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-59428", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-59428" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-20406", "datePublished": "2020-02-06T03:10:28.891775Z", "dateReserved": "2020-01-23T00:00:00", "dateUpdated": "2024-09-16T23:21:49.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4317
Vulnerability from cvelistv5
Published
2017-04-10 03:00
Modified
2024-08-06 00:25
Severity ?
EPSS score ?
Summary
Atlassian Confluence Server before 5.9.11 has XSS on the viewmyprofile.action page.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONF-42713 | x_refsource_MISC | |
http://www.securityfocus.com/bid/97513 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/CONFSERVER-42713 | x_refsource_MISC | |
https://confluence.atlassian.com/doc/confluence-5-9-11-release-notes-827123763.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Atlassian Confluence Server before 5.9.11 |
Version: Atlassian Confluence Server before 5.9.11 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:25:14.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONF-42713" }, { "name": "97513", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97513" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-42713" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/doc/confluence-5-9-11-release-notes-827123763.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Atlassian Confluence Server before 5.9.11", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Atlassian Confluence Server before 5.9.11" } ] } ], "datePublic": "2017-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Confluence Server before 5.9.11 has XSS on the viewmyprofile.action page." } ], "problemTypes": [ { "descriptions": [ { "description": "XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-15T22:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONF-42713" }, { "name": "97513", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97513" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-42713" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/doc/confluence-5-9-11-release-notes-827123763.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-4317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Atlassian Confluence Server before 5.9.11", "version": { "version_data": [ { "version_value": "Atlassian Confluence Server before 5.9.11" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Confluence Server before 5.9.11 has XSS on the viewmyprofile.action page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XSS" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONF-42713", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONF-42713" }, { "name": "97513", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97513" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-42713", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-42713" }, { "name": "https://confluence.atlassian.com/doc/confluence-5-9-11-release-notes-827123763.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/doc/confluence-5-9-11-release-notes-827123763.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-4317", "datePublished": "2017-04-10T03:00:00", "dateReserved": "2016-04-27T00:00:00", "dateUpdated": "2024-08-06T00:25:14.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18084
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-09-16 20:28
Severity ?
EPSS score ?
Summary
The usermacros resource in Atlassian Confluence Server before version 6.3.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the description of a macro.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-54904 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103064 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence |
Version: prior to 6.3.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54904" }, { "name": "103064", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103064" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.3.4" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The usermacros resource in Atlassian Confluence Server before version 6.3.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the description of a macro." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-20T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54904" }, { "name": "103064", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103064" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18084", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence", "version": { "version_data": [ { "version_value": "prior to 6.3.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The usermacros resource in Atlassian Confluence Server before version 6.3.4 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the description of a macro." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-54904", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CONFSERVER-54904" }, { "name": "103064", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103064" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18084", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T20:28:09.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-13389
Vulnerability from cvelistv5
Published
2018-07-10 13:00
Modified
2024-09-17 01:15
Severity ?
EPSS score ?
Summary
The attachment resource in Atlassian Confluence before version 6.6.1 allows remote attackers to spoof web content in the Mozilla Firefox Browser through attachments that have a content-type of application/rdf+xml.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-54906 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104755 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence |
Version: unspecified < 6.6.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54906" }, { "name": "104755", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104755" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence", "vendor": "Atlassian", "versions": [ { "lessThan": "6.6.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The attachment resource in Atlassian Confluence before version 6.6.1 allows remote attackers to spoof web content in the Mozilla Firefox Browser through attachments that have a content-type of application/rdf+xml." } ], "problemTypes": [ { "descriptions": [ { "description": "Content Spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-17T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54906" }, { "name": "104755", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104755" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-07-09T00:00:00", "ID": "CVE-2018-13389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.6.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The attachment resource in Atlassian Confluence before version 6.6.1 allows remote attackers to spoof web content in the Mozilla Firefox Browser through attachments that have a content-type of application/rdf+xml." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Content Spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-54906", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CONFSERVER-54906" }, { "name": "104755", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104755" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13389", "datePublished": "2018-07-10T13:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-17T01:15:40.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15005
Vulnerability from cvelistv5
Published
2019-11-08 03:55
Modified
2024-09-16 20:31
Severity ?
EPSS score ?
Summary
The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-20647 | x_refsource_MISC | |
https://herolab.usd.de/security-advisories/usd-2019-0016/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: unspecified < 6.6.0 |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "6.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.3.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "lessThan": "6.10.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:44:03", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-11-08T00:00:00", "ID": "CVE-2019-15005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.6.0" } ] } }, { "product_name": "Jira Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.3.2" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.0.1" } ] } }, { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.6.0" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Bamboo", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.10.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-20647", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "name": "https://herolab.usd.de/security-advisories/usd-2019-0016/", "refsource": "MISC", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15005", "datePublished": "2019-11-08T03:55:12.611106Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-16T20:31:42.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-3967
Vulnerability from cvelistv5
Published
2005-12-03 19:00
Modified
2024-08-07 23:31
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the dosearchsite.action module in Atlassian Confluence 2.0.1 Build 321 allows remote attackers to inject arbitrary web script or HTML via the searchQuery.queryString search module parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/15688 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/21377 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/17833 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2005/2691 | vdb-entry, x_refsource_VUPEN | |
http://pridels0.blogspot.com/2005/12/confluence-enterprise-wiki-xss-vuln.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:31:48.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15688", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15688" }, { "name": "21377", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/21377" }, { "name": "17833", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17833" }, { "name": "ADV-2005-2691", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2691" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://pridels0.blogspot.com/2005/12/confluence-enterprise-wiki-xss-vuln.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the dosearchsite.action module in Atlassian Confluence 2.0.1 Build 321 allows remote attackers to inject arbitrary web script or HTML via the searchQuery.queryString search module parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-02-03T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15688", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15688" }, { "name": "21377", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/21377" }, { "name": "17833", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17833" }, { "name": "ADV-2005-2691", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2691" }, { "tags": [ "x_refsource_MISC" ], "url": "http://pridels0.blogspot.com/2005/12/confluence-enterprise-wiki-xss-vuln.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the dosearchsite.action module in Atlassian Confluence 2.0.1 Build 321 allows remote attackers to inject arbitrary web script or HTML via the searchQuery.queryString search module parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15688", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15688" }, { "name": "21377", "refsource": "OSVDB", "url": "http://www.osvdb.org/21377" }, { "name": "17833", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17833" }, { "name": "ADV-2005-2691", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2691" }, { "name": "http://pridels0.blogspot.com/2005/12/confluence-enterprise-wiki-xss-vuln.html", "refsource": "MISC", "url": "http://pridels0.blogspot.com/2005/12/confluence-enterprise-wiki-xss-vuln.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3967", "datePublished": "2005-12-03T19:00:00", "dateReserved": "2005-12-03T00:00:00", "dateUpdated": "2024-08-07T23:31:48.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-9505
Vulnerability from cvelistv5
Published
2017-06-15 16:00
Modified
2024-10-16 13:50
Severity ?
EPSS score ?
Summary
Atlassian Confluence starting with 4.3.0 before 6.2.1 did not check if a user had permission to view a page when creating a workbox notification about new comments. An attacker who can login to Confluence could receive workbox notifications, which contain the content of comments, for comments added to a page after they started watching it even if they do not have permission to view the page itself.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99086 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/CONFSERVER-52560 | x_refsource_CONFIRM | |
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170613-0_Atlassian_Confluence_Access_Restriction_Bypass_v10.txt | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence Server |
Version: Versions of Confluence starting with 4.3.0 before 6.2.1 are affected by this vulnerability. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:11:01.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99086" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-52560" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170613-0_Atlassian_Confluence_Access_Restriction_Bypass_v10.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-9505", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-16T13:49:31.045428Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-16T13:50:42.415Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "Versions of Confluence starting with 4.3.0 before 6.2.1 are affected by this vulnerability." } ] } ], "datePublic": "2017-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Confluence starting with 4.3.0 before 6.2.1 did not check if a user had permission to view a page when creating a workbox notification about new comments. An attacker who can login to Confluence could receive workbox notifications, which contain the content of comments, for comments added to a page after they started watching it even if they do not have permission to view the page itself." } ], "problemTypes": [ { "descriptions": [ { "description": "Access Restriction Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-19T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "99086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99086" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-52560" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170613-0_Atlassian_Confluence_Access_Restriction_Bypass_v10.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "ID": "CVE-2017-9505", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence Server", "version": { "version_data": [ { "version_value": "Versions of Confluence starting with 4.3.0 before 6.2.1 are affected by this vulnerability." } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Confluence starting with 4.3.0 before 6.2.1 did not check if a user had permission to view a page when creating a workbox notification about new comments. An attacker who can login to Confluence could receive workbox notifications, which contain the content of comments, for comments added to a page after they started watching it even if they do not have permission to view the page itself." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Access Restriction Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "99086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99086" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-52560", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CONFSERVER-52560" }, { "name": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170613-0_Atlassian_Confluence_Access_Restriction_Bypass_v10.txt", "refsource": "MISC", "url": "https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170613-0_Atlassian_Confluence_Access_Restriction_Bypass_v10.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-9505", "datePublished": "2017-06-15T16:00:00", "dateReserved": "2017-06-07T00:00:00", "dateUpdated": "2024-10-16T13:50:42.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3398
Vulnerability from cvelistv5
Published
2019-04-18 17:21
Modified
2024-09-16 17:49
Severity ?
EPSS score ?
Summary
Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-58102 | x_refsource_MISC | |
https://seclists.org/bugtraq/2019/Apr/33 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/108067 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence |
Version: 2.0.0 < unspecified Version: unspecified < 6.6.13 Version: 6.7.0 < unspecified Version: unspecified < 6.12.4 Version: 6.13.0 < unspecified Version: unspecified < 6.13.4 Version: 6.14.0 < unspecified Version: unspecified < 6.14.3 Version: 6.15.0 < unspecified Version: unspecified < 6.15.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.521Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-58102" }, { "name": "20190424 Confluence Security Advisory - 2019-04-17", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Apr/33" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html" }, { "name": "108067", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108067" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "2.0.0", "versionType": "custom" }, { "lessThan": "6.6.13", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.12.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.13.0", "versionType": "custom" }, { "lessThan": "6.13.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.14.0", "versionType": "custom" }, { "lessThan": "6.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.15.0", "versionType": "custom" }, { "lessThan": "6.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has \u0027Admin\u0027 permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-12T17:06:43", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-58102" }, { "name": "20190424 Confluence Security Advisory - 2019-04-17", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Apr/33" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html" }, { "name": "108067", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108067" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-04-17T00:00:00", "ID": "CVE-2019-3398", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "2.0.0" }, { "version_affected": "\u003c", "version_value": "6.6.13" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.12.4" }, { "version_affected": "\u003e=", "version_value": "6.13.0" }, { "version_affected": "\u003c", "version_value": "6.13.4" }, { "version_affected": "\u003e=", "version_value": "6.14.0" }, { "version_affected": "\u003c", "version_value": "6.14.3" }, { "version_affected": "\u003e=", "version_value": "6.15.0" }, { "version_affected": "\u003c", "version_value": "6.15.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has \u0027Admin\u0027 permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-58102", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-58102" }, { "name": "20190424 Confluence Security Advisory - 2019-04-17", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Apr/33" }, { "name": "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html" }, { "name": "108067", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108067" }, { "name": "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-Directory-Traversal.html" }, { "name": "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-3398", "datePublished": "2019-04-18T17:21:37.687349Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T17:49:22.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3394
Vulnerability from cvelistv5
Published
2019-08-29 14:32
Modified
2024-09-17 00:02
Severity ?
EPSS score ?
Summary
There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-58734 | x_refsource_MISC | |
https://confluence.atlassian.com/x/uAsvOg | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence Server |
Version: 6.1.0 < unspecified Version: unspecified < 6.6.16 Version: 6.7.0 < unspecified Version: unspecified < 6.13.7 Version: 6.14.0 < unspecified Version: unspecified < 6.15.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.337Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-58734" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://confluence.atlassian.com/x/uAsvOg" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.14.0", "versionType": "custom" }, { "lessThan": "6.15.8", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-08-28T00:00:00", "descriptions": [ { "lang": "en", "value": "There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under \u003cinstall-directory\u003e/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-03T14:33:34", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-58734" }, { "tags": [ "x_refsource_MISC" ], "url": "https://confluence.atlassian.com/x/uAsvOg" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-08-28T10:00:00", "ID": "CVE-2019-3394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.6.16" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.13.7" }, { "version_affected": "\u003e=", "version_value": "6.14.0" }, { "version_affected": "\u003c", "version_value": "6.15.8" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under \u003cinstall-directory\u003e/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-58734", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-58734" }, { "name": "https://confluence.atlassian.com/x/uAsvOg", "refsource": "MISC", "url": "https://confluence.atlassian.com/x/uAsvOg" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-3394", "datePublished": "2019-08-29T14:32:32.947868Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-17T00:02:29.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-16856
Vulnerability from cvelistv5
Published
2017-12-05 16:00
Modified
2024-09-16 23:10
Severity ?
EPSS score ?
Summary
The RSS Feed macro in Atlassian Confluence before version 6.5.2 allows remote attackers to inject arbitrary HTML or JavaScript via cross site scripting (XSS) vulnerabilities in various rss properties which were used as links without restriction on their scheme.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-54395 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/102094 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence |
Version: All versions prior to version 6.5.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54395" }, { "name": "102094", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102094" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "All versions prior to version 6.5.2" } ] } ], "datePublic": "2017-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The RSS Feed macro in Atlassian Confluence before version 6.5.2 allows remote attackers to inject arbitrary HTML or JavaScript via cross site scripting (XSS) vulnerabilities in various rss properties which were used as links without restriction on their scheme." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-08T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54395" }, { "name": "102094", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102094" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2017-12-05T00:00:00", "ID": "CVE-2017-16856", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence", "version": { "version_data": [ { "version_value": "All versions prior to version 6.5.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The RSS Feed macro in Atlassian Confluence before version 6.5.2 allows remote attackers to inject arbitrary HTML or JavaScript via cross site scripting (XSS) vulnerabilities in various rss properties which were used as links without restriction on their scheme." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-54395", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CONFSERVER-54395" }, { "name": "102094", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102094" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-16856", "datePublished": "2017-12-05T16:00:00Z", "dateReserved": "2017-11-16T00:00:00", "dateUpdated": "2024-09-16T23:10:55.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8398
Vulnerability from cvelistv5
Published
2016-04-11 21:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.8.17 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to rest/prototype/1/session/check.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/537232/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://www.exploit-db.com/exploits/39170/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:32.581Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160104 Confluence Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537232/100/0/threaded" }, { "name": "39170", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/39170/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.8.17 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to rest/prototype/1/session/check." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160104 Confluence Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/537232/100/0/threaded" }, { "name": "39170", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/39170/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8398", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.8.17 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to rest/prototype/1/session/check." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160104 Confluence Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537232/100/0/threaded" }, { "name": "39170", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/39170/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8398", "datePublished": "2016-04-11T21:00:00", "dateReserved": "2015-12-02T00:00:00", "dateUpdated": "2024-08-06T08:13:32.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18085
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-09-17 03:22
Severity ?
EPSS score ?
Summary
The viewdefaultdecorator resource in Atlassian Confluence Server before version 6.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the key parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103062 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/CONFSERVER-54905 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence |
Version: prior to 6.6.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103062", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103062" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54905" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.6.1" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The viewdefaultdecorator resource in Atlassian Confluence Server before version 6.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the key parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-20T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "103062", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103062" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54905" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18085", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence", "version": { "version_data": [ { "version_value": "prior to 6.6.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The viewdefaultdecorator resource in Atlassian Confluence Server before version 6.6.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the key parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "103062", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103062" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-54905", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CONFSERVER-54905" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18085", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-17T03:22:54.533Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15006
Vulnerability from cvelistv5
Published
2019-12-19 00:50
Modified
2024-09-17 01:15
Severity ?
EPSS score ?
Summary
There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-59244 | x_refsource_MISC | |
https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html | x_refsource_MISC | |
https://twitter.com/SwiftOnSecurity/status/1202034106495832067 | x_refsource_MISC | |
https://seclists.org/bugtraq/2019/Dec/36 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence Server |
Version: 6.11.0 < unspecified Version: unspecified < 6.13.10 Version: 6.14.0 < unspecified Version: unspecified < 6.15.10 Version: 7.0.1 < unspecified Version: unspecified < 7.0.5 Version: 7.1.0 < unspecified Version: unspecified < 7.1.2 Version: 7.2.0-beta1 < unspecified Version: unspecified < 7.2.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-59244" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/SwiftOnSecurity/status/1202034106495832067" }, { "name": "20191219 Confluence Server and Data Center Security Advisory - 2019-12-18 - CVE-2019-15006", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/36" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "6.11.0", "versionType": "custom" }, { "lessThan": "6.13.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.14.0", "versionType": "custom" }, { "lessThan": "6.15.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.0.1", "versionType": "custom" }, { "lessThan": "7.0.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.1.0", "versionType": "custom" }, { "lessThan": "7.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.2.0-beta1", "versionType": "custom" }, { "lessThan": "7.2.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information." } ], "problemTypes": [ { "descriptions": [ { "description": "Man-in-the-Middle (MitM)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-21T08:06:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-59244" }, { "tags": [ "x_refsource_MISC" ], "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/SwiftOnSecurity/status/1202034106495832067" }, { "name": "20191219 Confluence Server and Data Center Security Advisory - 2019-12-18 - CVE-2019-15006", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/36" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-12-19T00:00:00", "ID": "CVE-2019-15006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "6.11.0" }, { "version_affected": "\u003c", "version_value": "6.13.10" }, { "version_affected": "\u003e=", "version_value": "6.14.0" }, { "version_affected": "\u003c", "version_value": "6.15.10" }, { "version_affected": "\u003e=", "version_value": "7.0.1" }, { "version_affected": "\u003c", "version_value": "7.0.5" }, { "version_affected": "\u003e=", "version_value": "7.1.0" }, { "version_affected": "\u003c", "version_value": "7.1.2" }, { "version_affected": "\u003e=", "version_value": "7.2.0-beta1" }, { "version_affected": "\u003c", "version_value": "7.2.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Man-in-the-Middle (MitM)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-59244", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-59244" }, { "name": "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html", "refsource": "MISC", "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-982324349.html" }, { "name": "https://twitter.com/SwiftOnSecurity/status/1202034106495832067", "refsource": "MISC", "url": "https://twitter.com/SwiftOnSecurity/status/1202034106495832067" }, { "name": "20191219 Confluence Server and Data Center Security Advisory - 2019-12-18 - CVE-2019-15006", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/36" }, { "name": "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Middle.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15006", "datePublished": "2019-12-19T00:50:12.007660Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-17T01:15:47.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-4027
Vulnerability from cvelistv5
Published
2020-07-01 01:35
Modified
2024-09-17 01:56
Severity ?
EPSS score ?
Summary
Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-59898 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Confluence Server |
Version: unspecified < 7.4.5 Version: 7.5.0 < unspecified Version: unspecified < 7.5.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-59898" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.5.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.5.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-06-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1." } ], "problemTypes": [ { "descriptions": [ { "description": "Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-04T05:52:12", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-59898" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2020-06-18T00:00:00", "ID": "CVE-2020-4027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.5" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.5.1" } ] } }, { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.5" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.5.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-59898", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-59898" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2020-4027", "datePublished": "2020-07-01T01:35:29.292383Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-17T01:56:01.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18083
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-09-16 18:09
Severity ?
EPSS score ?
Summary
The editinword resource in Atlassian Confluence Server before version 6.4.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the contents of an uploaded file.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-54903 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence |
Version: prior to 6.4.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.315Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54903" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.4.0" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The editinword resource in Atlassian Confluence Server before version 6.4.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the contents of an uploaded file." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T13:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-54903" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence", "version": { "version_data": [ { "version_value": "prior to 6.4.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The editinword resource in Atlassian Confluence Server before version 6.4.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the contents of an uploaded file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-54903", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/CONFSERVER-54903" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18083", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T18:09:18.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2926
Vulnerability from cvelistv5
Published
2012-05-22 15:00
Modified
2024-08-06 19:50
Severity ?
EPSS score ?
Summary
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/75682 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/49146 | third-party-advisory, x_refsource_SECUNIA | |
http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://osvdb.org/81993 | vdb-entry, x_refsource_OSVDB | |
http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/53595 | vdb-entry, x_refsource_BID | |
http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "fisheye-crucible-xml-dos(75682)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49146" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53595" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "fisheye-crucible-xml-dos(75682)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49146" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53595" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "fisheye-crucible-xml-dos(75682)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49146" }, { "name": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "name": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "refsource": "OSVDB", "url": "http://osvdb.org/81993" }, { "name": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53595" }, { "name": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2926", "datePublished": "2012-05-22T15:00:00", "dateReserved": "2012-05-22T00:00:00", "dateUpdated": "2024-08-06T19:50:05.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6283
Vulnerability from cvelistv5
Published
2017-01-18 22:00
Modified
2024-08-06 01:22
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.10.6 allows remote attackers to inject arbitrary web script or HTML via the newFileName parameter to pages/doeditattachment.action.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/95288 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/140363/Atlassian-Confluence-5.9.12-Cross-Site-Scripting.html | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/Jan/12 | mailing-list, x_refsource_FULLDISC | |
http://seclists.org/fulldisclosure/2017/Jan/3 | mailing-list, x_refsource_FULLDISC | |
https://www.exploit-db.com/exploits/40989/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:22:20.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "95288", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95288" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/140363/Atlassian-Confluence-5.9.12-Cross-Site-Scripting.html" }, { "name": "20170106 Re: Persisted Cross-Site Scripting (XSS) in Confluence Jira Software", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Jan/12" }, { "name": "20170103 Persisted Cross-Site Scripting (XSS) in Confluence Jira Software", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Jan/3" }, { "name": "40989", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40989/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.10.6 allows remote attackers to inject arbitrary web script or HTML via the newFileName parameter to pages/doeditattachment.action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "95288", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95288" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/140363/Atlassian-Confluence-5.9.12-Cross-Site-Scripting.html" }, { "name": "20170106 Re: Persisted Cross-Site Scripting (XSS) in Confluence Jira Software", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Jan/12" }, { "name": "20170103 Persisted Cross-Site Scripting (XSS) in Confluence Jira Software", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Jan/3" }, { "name": "40989", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40989/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-6283", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Atlassian Confluence before 5.10.6 allows remote attackers to inject arbitrary web script or HTML via the newFileName parameter to pages/doeditattachment.action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "95288", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95288" }, { "name": "http://packetstormsecurity.com/files/140363/Atlassian-Confluence-5.9.12-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/140363/Atlassian-Confluence-5.9.12-Cross-Site-Scripting.html" }, { "name": "20170106 Re: Persisted Cross-Site Scripting (XSS) in Confluence Jira Software", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Jan/12" }, { "name": "20170103 Persisted Cross-Site Scripting (XSS) in Confluence Jira Software", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Jan/3" }, { "name": "40989", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40989/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-6283", "datePublished": "2017-01-18T22:00:00", "dateReserved": "2016-07-22T00:00:00", "dateUpdated": "2024-08-06T01:22:20.862Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3396
Vulnerability from cvelistv5
Published
2019-03-25 18:37
Modified
2024-09-16 23:30
Severity ?
EPSS score ?
Summary
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/CONFSERVER-57974 | x_refsource_MISC | |
http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html | x_refsource_MISC | |
http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector | x_refsource_MISC | |
https://www.exploit-db.com/exploits/46731/ | exploit, x_refsource_EXPLOIT-DB | |
http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Confluence Server |
Version: unspecified < 6.6.12 Version: 6.7.0 < unspecified Version: unspecified < 6.12.3 Version: next of 6.13.0 < unspecified Version: unspecified < 6.13.3 Version: next of 6.14.0 < unspecified Version: unspecified < 6.14.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-57974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector" }, { "name": "46731", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46731/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "6.6.12", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.12.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "next of 6.13.0", "versionType": "custom" }, { "lessThan": "6.13.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "next of 6.14.0", "versionType": "custom" }, { "lessThan": "6.14.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection." } ], "problemTypes": [ { "descriptions": [ { "description": "Server-Side Template Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-22T16:06:08", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-57974" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector" }, { "name": "46731", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46731/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-03-20T10:00:00", "ID": "CVE-2019-3396", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.6.12" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.12.3" }, { "version_affected": "\u003e", "version_value": "6.13.0" }, { "version_affected": "\u003c", "version_value": "6.13.3" }, { "version_affected": "\u003e", "version_value": "6.14.0" }, { "version_affected": "\u003c", "version_value": "6.14.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Server-Side Template Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-57974", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-57974" }, { "name": "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html" }, { "name": "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector", "refsource": "MISC", "url": "http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector" }, { "name": "46731", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46731/" }, { "name": "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-3396", "datePublished": "2019-03-25T18:37:06.256667Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T23:30:57.985Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8399
Vulnerability from cvelistv5
Published
2016-04-11 21:00
Modified
2024-08-06 08:13
Severity ?
EPSS score ?
Summary
Atlassian Confluence before 5.8.17 allows remote authenticated users to read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/537232/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://www.exploit-db.com/exploits/39170/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:32.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160104 Confluence Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537232/100/0/threaded" }, { "name": "39170", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/39170/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Confluence before 5.8.17 allows remote authenticated users to read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160104 Confluence Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/537232/100/0/threaded" }, { "name": "39170", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/39170/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8399", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Confluence before 5.8.17 allows remote authenticated users to read configuration files via the decoratorName parameter to (1) spaces/viewdefaultdecorator.action or (2) admin/viewdefaultdecorator.action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160104 Confluence Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537232/100/0/threaded" }, { "name": "39170", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/39170/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8399", "datePublished": "2016-04-11T21:00:00", "dateReserved": "2015-12-02T00:00:00", "dateUpdated": "2024-08-06T08:13:32.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
jvndb-2018-000114
Vulnerability from jvndb
Published
2018-10-29 13:36
Modified
2018-10-29 13:36
Severity ?
Summary
Confluence Server vulnerable to script injection
Details
User Macros of Confluence Server provided by Atlassian Pty Ltd. contains a script injection vulnerability (CWE-74).
Kanta Nishitani of Information Science College reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN37943805/index.html | |
Cross-site Scripting(CWE-79) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Atlassian | Confluence |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000114.html", "dc:date": "2018-10-29T13:36+09:00", "dcterms:issued": "2018-10-29T13:36+09:00", "dcterms:modified": "2018-10-29T13:36+09:00", "description": "User Macros of Confluence Server provided by Atlassian Pty Ltd. contains a script injection vulnerability (CWE-74).\r\n\r\nKanta Nishitani of Information Science College reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000114.html", "sec:cpe": { "#text": "cpe:/a:atlassian:confluence", "@product": "Confluence", "@vendor": "Atlassian", "@version": "2.2" }, "sec:cvss": [ { "@score": "3.5", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2018-000114", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN37943805/index.html", "@id": "JVN#37943805", "@source": "JVN" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Confluence Server vulnerable to script injection" }