Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-22515 (GCVE-0-2023-22515)
Vulnerability from cvelistv5 – Published: 2023-10-04 14:00 – Updated: 2026-03-25 14:56- BASM (Broken Authentication & Session Management)
| Vendor | Product | Version | |
|---|---|---|---|
| Atlassian | Confluence Data Center |
Unaffected:
< 8.0.0
Affected: >= 8.0.0 Affected: >= 8.0.1 Affected: >= 8.0.2 Affected: >= 8.0.3 Affected: >= 8.1.3 Affected: >= 8.1.4 Affected: >= 8.2.0 Affected: >= 8.2.1 Affected: >= 8.2.2 Affected: >= 8.2.3 Affected: >= 8.3.0 Affected: >= 8.3.1 Affected: >= 8.3.2 Affected: >= 8.4.0 Affected: >= 8.4.1 Affected: >= 8.4.2 Affected: >= 8.5.0 Affected: >= 8.5.1 Unaffected: >= 8.3.3 Unaffected: >= 8.4.3 Unaffected: >= 8.5.2 |
|
| Atlassian | Confluence Server |
Unaffected:
< 8.0.0
Affected: >= 8.0.0 Affected: >= 8.0.1 Affected: >= 8.0.2 Affected: >= 8.0.3 Affected: >= 8.1.3 Affected: >= 8.1.4 Affected: >= 8.2.0 Affected: >= 8.2.1 Affected: >= 8.2.2 Affected: >= 8.2.3 Affected: >= 8.3.0 Affected: >= 8.3.1 Affected: >= 8.3.2 Affected: >= 8.4.0 Affected: >= 8.4.1 Affected: >= 8.4.2 Affected: >= 8.5.0 Affected: >= 8.5.1 Unaffected: >= 8.3.3 Unaffected: >= 8.4.3 Unaffected: >= 8.5.2 |
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Confluence Data Center and Server |
| Due Date | 2023-10-13 |
| Date Added | 2023-10-05 |
| Vendorproject | Atlassian |
| Vulnerabilityname | Atlassian Confluence Data Center and Server Broken Access Control Vulnerability |
| Knownransomwarecampaignuse | Known |
References
EUVD KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Csirt Report
Signal: Confirmed Compromise
Confidence: 75%
Source: enisa-cnw-kev
Details
| Cwes | - |
|---|---|
| Euvd | EUVD-2023-26655 |
| Notes | - |
| Catalog | ENISA / EU CSIRTs Network (CNW) KEV CSV |
| Product | Confluence Server and Data Server |
| Datereported | 23/01/25 |
| Originsource | cnw |
| Vendorproject | Atlassian |
| Exploitationtype | ransomware |
| Vulnerabilityname | - |
| Threatactorsexploiting | - |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:13:48.693Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
},
{
"tags": [
"x_transferred"
],
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
},
{
"tags": [
"x_transferred"
],
"url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22515",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2023-12-09T05:05:17.297744Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-10-05",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-25T14:56:37.404Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Confluence Data Center",
"vendor": "Atlassian",
"versions": [
{
"status": "unaffected",
"version": "\u003c 8.0.0"
},
{
"status": "affected",
"version": "\u003e= 8.0.0"
},
{
"status": "affected",
"version": "\u003e= 8.0.1"
},
{
"status": "affected",
"version": "\u003e= 8.0.2"
},
{
"status": "affected",
"version": "\u003e= 8.0.3"
},
{
"status": "affected",
"version": "\u003e= 8.1.3"
},
{
"status": "affected",
"version": "\u003e= 8.1.4"
},
{
"status": "affected",
"version": "\u003e= 8.2.0"
},
{
"status": "affected",
"version": "\u003e= 8.2.1"
},
{
"status": "affected",
"version": "\u003e= 8.2.2"
},
{
"status": "affected",
"version": "\u003e= 8.2.3"
},
{
"status": "affected",
"version": "\u003e= 8.3.0"
},
{
"status": "affected",
"version": "\u003e= 8.3.1"
},
{
"status": "affected",
"version": "\u003e= 8.3.2"
},
{
"status": "affected",
"version": "\u003e= 8.4.0"
},
{
"status": "affected",
"version": "\u003e= 8.4.1"
},
{
"status": "affected",
"version": "\u003e= 8.4.2"
},
{
"status": "affected",
"version": "\u003e= 8.5.0"
},
{
"status": "affected",
"version": "\u003e= 8.5.1"
},
{
"status": "unaffected",
"version": "\u003e= 8.3.3"
},
{
"status": "unaffected",
"version": "\u003e= 8.4.3"
},
{
"status": "unaffected",
"version": "\u003e= 8.5.2"
}
]
},
{
"product": "Confluence Server",
"vendor": "Atlassian",
"versions": [
{
"status": "unaffected",
"version": "\u003c 8.0.0"
},
{
"status": "affected",
"version": "\u003e= 8.0.0"
},
{
"status": "affected",
"version": "\u003e= 8.0.1"
},
{
"status": "affected",
"version": "\u003e= 8.0.2"
},
{
"status": "affected",
"version": "\u003e= 8.0.3"
},
{
"status": "affected",
"version": "\u003e= 8.1.3"
},
{
"status": "affected",
"version": "\u003e= 8.1.4"
},
{
"status": "affected",
"version": "\u003e= 8.2.0"
},
{
"status": "affected",
"version": "\u003e= 8.2.1"
},
{
"status": "affected",
"version": "\u003e= 8.2.2"
},
{
"status": "affected",
"version": "\u003e= 8.2.3"
},
{
"status": "affected",
"version": "\u003e= 8.3.0"
},
{
"status": "affected",
"version": "\u003e= 8.3.1"
},
{
"status": "affected",
"version": "\u003e= 8.3.2"
},
{
"status": "affected",
"version": "\u003e= 8.4.0"
},
{
"status": "affected",
"version": "\u003e= 8.4.1"
},
{
"status": "affected",
"version": "\u003e= 8.4.2"
},
{
"status": "affected",
"version": "\u003e= 8.5.0"
},
{
"status": "affected",
"version": "\u003e= 8.5.1"
},
{
"status": "unaffected",
"version": "\u003e= 8.3.3"
},
{
"status": "unaffected",
"version": "\u003e= 8.4.3"
},
{
"status": "unaffected",
"version": "\u003e= 8.5.2"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "an Atlassian customer"
}
],
"descriptions": [
{
"lang": "en",
"value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 10,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "BASM (Broken Authentication \u0026 Session Management)",
"lang": "en",
"type": "BASM (Broken Authentication \u0026 Session Management)"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-10-20T16:00:01.026Z",
"orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
"shortName": "atlassian"
},
"references": [
{
"url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
},
{
"url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
},
{
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
},
{
"url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
"assignerShortName": "atlassian",
"cveId": "CVE-2023-22515",
"datePublished": "2023-10-04T14:00:00.820Z",
"dateReserved": "2023-01-01T00:01:22.331Z",
"dateUpdated": "2026-03-25T14:56:37.404Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2023-22515",
"dateAdded": "2023-10-05",
"dueDate": "2023-10-13",
"knownRansomwareCampaignUse": "Known",
"notes": "https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22515",
"product": "Confluence Data Center and Server",
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.",
"shortDescription": "Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.",
"vendorProject": "Atlassian",
"vulnerabilityName": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability"
},
"cnw_known_exploited": {
"CVE": "CVE-2023-22515",
"EUVD": "EUVD-2023-26655",
"cwes": "-",
"dateReported": "23/01/25",
"exploitationType": "ransomware",
"notes": "-",
"originSource": "cnw",
"product": "Confluence Server and Data Server",
"shortDescription": "-",
"threatActorsExploiting": "-",
"vendorProject": "Atlassian",
"vulnerabilityName": "-"
},
"epss": {
"cve": "CVE-2023-22515",
"date": "2026-05-13",
"epss": "0.94326",
"percentile": "0.99954"
},
"fkie_nvd": {
"cisaActionDue": "2023-10-13",
"cisaExploitAdd": "2023-10-05",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.",
"cisaVulnerabilityName": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.0.0\", \"versionEndExcluding\": \"8.3.3\", \"matchCriteriaId\": \"85B2AD9F-CBA6-4559-9AE3-5F76A9EC3B7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.4.0\", \"versionEndExcluding\": \"8.4.3\", \"matchCriteriaId\": \"38F9918D-6848-4CD6-8096-4FB48C23818B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.5.0\", \"versionEndExcluding\": \"8.5.2\", \"matchCriteriaId\": \"8D646BCF-214F-449D-AEEB-B253E8715394\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.0.0\", \"versionEndExcluding\": \"8.3.3\", \"matchCriteriaId\": \"970A3DA7-5114-4696-A93D-C3D5AFF5C6C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.4.0\", \"versionEndExcluding\": \"8.4.3\", \"matchCriteriaId\": \"A2EB19CD-AE29-4775-91C5-05B01A96AC6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.5.0\", \"versionEndExcluding\": \"8.5.2\", \"matchCriteriaId\": \"79229BE7-0AA0-4308-8BB2-8FB11E8B9AD7\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \\r\\n\\r\\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. \"}, {\"lang\": \"es\", \"value\": \"Atlassian ha sido informado de un problema informado por un pu\\u00f1ado de clientes en el que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center and Server de acceso p\\u00fablico para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\\u00e9s de un dominio atlassian.net, est\\u00e1 alojado en Atlassian y no es vulnerable a este problema.\"}]",
"id": "CVE-2023-22515",
"lastModified": "2024-11-21T07:44:57.830",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"security@atlassian.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 10.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 6.0}]}",
"published": "2023-10-04T14:15:10.440",
"references": "[{\"url\": \"http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html\", \"source\": \"security@atlassian.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515\", \"source\": \"security@atlassian.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276\", \"source\": \"security@atlassian.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jira.atlassian.com/browse/CONFSERVER-92475\", \"source\": \"security@atlassian.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jira.atlassian.com/browse/CONFSERVER-92475\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@atlassian.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-22515\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2023-10-04T14:15:10.440\",\"lastModified\":\"2026-03-25T17:40:00.140\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \\r\\n\\r\\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\"},{\"lang\":\"es\",\"value\":\"Atlassian ha sido informado de un problema informado por un pu\u00f1ado de clientes en el que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center and Server de acceso p\u00fablico para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@atlassian.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":10.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":6.0}]},\"cisaExploitAdd\":\"2023-10-05\",\"cisaActionDue\":\"2023-10-13\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.\",\"cisaVulnerabilityName\":\"Atlassian Confluence Data Center and Server Broken Access Control Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.3.3\",\"matchCriteriaId\":\"85B2AD9F-CBA6-4559-9AE3-5F76A9EC3B7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.4.0\",\"versionEndExcluding\":\"8.4.3\",\"matchCriteriaId\":\"38F9918D-6848-4CD6-8096-4FB48C23818B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.5.0\",\"versionEndExcluding\":\"8.5.2\",\"matchCriteriaId\":\"8D646BCF-214F-449D-AEEB-B253E8715394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.3.3\",\"matchCriteriaId\":\"970A3DA7-5114-4696-A93D-C3D5AFF5C6C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.4.0\",\"versionEndExcluding\":\"8.4.3\",\"matchCriteriaId\":\"A2EB19CD-AE29-4775-91C5-05B01A96AC6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.5.0\",\"versionEndExcluding\":\"8.5.2\",\"matchCriteriaId\":\"79229BE7-0AA0-4308-8BB2-8FB11E8B9AD7\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html\",\"source\":\"security@atlassian.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515\",\"source\":\"security@atlassian.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276\",\"source\":\"security@atlassian.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/CONFSERVER-92475\",\"source\":\"security@atlassian.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/CONFSERVER-92475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://jira.atlassian.com/browse/CONFSERVER-92475\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T10:13:48.693Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-22515\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2023-12-09T05:05:17.297744Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-10-05\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515\"}}}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-13T18:01:01.747Z\"}}], \"cna\": {\"credits\": [{\"lang\": \"en\", \"value\": \"an Atlassian customer\"}], \"metrics\": [{\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 10, \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\"}}], \"affected\": [{\"vendor\": \"Atlassian\", \"product\": \"Confluence Data Center\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"\u003c 8.0.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.0.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.0.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.0.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.0.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.1.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.1.4\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.2.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.2.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.2.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.2.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.3.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.3.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.3.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.4.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.4.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.4.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.5.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.5.1\"}, {\"status\": \"unaffected\", \"version\": \"\u003e= 8.3.3\"}, {\"status\": \"unaffected\", \"version\": \"\u003e= 8.4.3\"}, {\"status\": \"unaffected\", \"version\": \"\u003e= 8.5.2\"}]}, {\"vendor\": \"Atlassian\", \"product\": \"Confluence Server\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"\u003c 8.0.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.0.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.0.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.0.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.0.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.1.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.1.4\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.2.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.2.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.2.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.2.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.3.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.3.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.3.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.4.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.4.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.4.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.5.0\"}, {\"status\": \"affected\", \"version\": \"\u003e= 8.5.1\"}, {\"status\": \"unaffected\", \"version\": \"\u003e= 8.3.3\"}, {\"status\": \"unaffected\", \"version\": \"\u003e= 8.4.3\"}, {\"status\": \"unaffected\", \"version\": \"\u003e= 8.5.2\"}]}], \"references\": [{\"url\": \"http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html\"}, {\"url\": \"https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515\"}, {\"url\": \"https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276\"}, {\"url\": \"https://jira.atlassian.com/browse/CONFSERVER-92475\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \\r\\n\\r\\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"BASM (Broken Authentication \u0026 Session Management)\", \"description\": \"BASM (Broken Authentication \u0026 Session Management)\"}]}], \"providerMetadata\": {\"orgId\": \"f08a6ab8-ed46-4c22-8884-d911ccfe3c66\", \"shortName\": \"atlassian\", \"dateUpdated\": \"2023-10-20T16:00:01.026Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-22515\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-25T14:56:37.404Z\", \"dateReserved\": \"2023-01-01T00:01:22.331Z\", \"assignerOrgId\": \"f08a6ab8-ed46-4c22-8884-d911ccfe3c66\", \"datePublished\": \"2023-10-04T14:00:00.820Z\", \"assignerShortName\": \"atlassian\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2023-22515
Vulnerability from fkie_nvd - Published: 2023-10-04 14:15 - Updated: 2026-03-25 17:40| Vendor | Product | Version | |
|---|---|---|---|
| atlassian | confluence_data_center | * | |
| atlassian | confluence_data_center | * | |
| atlassian | confluence_data_center | * | |
| atlassian | confluence_server | * | |
| atlassian | confluence_server | * | |
| atlassian | confluence_server | * |
{
"cisaActionDue": "2023-10-13",
"cisaExploitAdd": "2023-10-05",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.",
"cisaVulnerabilityName": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85B2AD9F-CBA6-4559-9AE3-5F76A9EC3B7F",
"versionEndExcluding": "8.3.3",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38F9918D-6848-4CD6-8096-4FB48C23818B",
"versionEndExcluding": "8.4.3",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D646BCF-214F-449D-AEEB-B253E8715394",
"versionEndExcluding": "8.5.2",
"versionStartIncluding": "8.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "970A3DA7-5114-4696-A93D-C3D5AFF5C6C5",
"versionEndExcluding": "8.3.3",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2EB19CD-AE29-4775-91C5-05B01A96AC6C",
"versionEndExcluding": "8.4.3",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79229BE7-0AA0-4308-8BB2-8FB11E8B9AD7",
"versionEndExcluding": "8.5.2",
"versionStartIncluding": "8.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue."
},
{
"lang": "es",
"value": "Atlassian ha sido informado de un problema informado por un pu\u00f1ado de clientes en el que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center and Server de acceso p\u00fablico para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema."
}
],
"id": "CVE-2023-22515",
"lastModified": "2026-03-25T17:40:00.140",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "security@atlassian.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-04T14:15:10.440",
"references": [
{
"source": "security@atlassian.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
},
{
"source": "security@atlassian.com",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
},
{
"source": "security@atlassian.com",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
},
{
"source": "security@atlassian.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515"
}
],
"sourceIdentifier": "security@atlassian.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
BDU:2023-06364
Vulnerability from fstec - Published: 04.10.2023{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Atlassian",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 8.0.0 \u0434\u043e 8.3.3 (Confluence Server), \u043e\u0442 8.0.0 \u0434\u043e 8.4.3 (Confluence Server), \u043e\u0442 8.0.0 \u0434\u043e 8.5.2 (Confluence Server), \u043e\u0442 8.0.0 \u0434\u043e 8.3.3 (Jira Data Center), \u043e\u0442 8.0.0 \u0434\u043e 8.4.3 (Jira Data Center), \u043e\u0442 8.0.0 \u0434\u043e 8.5.2 (Jira Data Center)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://jira.atlassian.com/browse/CONFSERVER-92475",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "04.10.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "06.10.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-06364",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-22515",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Confluence Server, Jira Data Center",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 Atlassian Confluence Server \u0438 \u0434\u0430\u0442\u0430 \u0446\u0435\u043d\u0442\u0440\u0430 Confluence Data Center, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (CWE-284)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 Atlassian Confluence Server \u0438 \u0434\u0430\u0442\u0430 \u0446\u0435\u043d\u0442\u0440\u0430 Confluence Data Center \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://vuldb.com/ru/?id.241275\nhttps://confluence.atlassian.com/kb/faq-for-cve-2023-22515-1295682188.html\nhttps://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html\nhttps://jira.atlassian.com/browse/CONFSERVER-92475\nhttps://www.rapid7.com/blog/post/2023/10/04/etr-cve-2023-22515-zero-day-privilege-escalation-in-confluence-server-and-data-center/\nhttps://github.com/Chocapikk/CVE-2023-22515\nhttps://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-284",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}
CERTFR-2023-AVI-0803
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Atlassian Confluence. Elle permet à un attaquant de provoquer une élévation de privilèges et un contournement de la politique de sécurité.
L'éditeur a connaissance d'un rapport indiquant que la vulnérabilité a été exploitée sur des instances Confluence Data Center et Server accessibles depuis internet.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Atlassian | Confluence | Confluence Data Center et Confluence Server versions 8.4.x antérieures à 8.4.3 | ||
| Atlassian | Confluence | Confluence Data Center et Confluence Server versions 8.0.x à 8.3.x antérieures à 8.3.3 | ||
| Atlassian | Confluence | Confluence Data Center et Confluence Server versions 8.5.x antérieures à 8.5.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Confluence Data Center et Confluence Server versions 8.4.x ant\u00e9rieures \u00e0 8.4.3",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center et Confluence Server versions 8.0.x \u00e0 8.3.x ant\u00e9rieures \u00e0 8.3.3",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center et Confluence Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-22515",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22515"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0803",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-05T00:00:00.000000"
},
{
"description": "Ajout du risque \"Contournement de la politiique de s\u00e9curit\u00e9\" suite \u00e0 la mise \u00e0 jour de l\u0027avis par l\u0027\u00e9diteur.",
"revision_date": "2023-10-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Atlassian Confluence. Elle\npermet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un\ncontournement de la politique de s\u00e9curit\u00e9.\n\nL\u0027\u00e9diteur a connaissance d\u0027un rapport indiquant que la vuln\u00e9rabilit\u00e9 a\n\u00e9t\u00e9 exploit\u00e9e sur des instances Confluence Data Center et Server\naccessibles depuis internet.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Atlassian Confluence",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian 1295682276 du 04 octobre 2023",
"url": "https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html"
}
]
}
CERTFR-2023-AVI-0803
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Atlassian Confluence. Elle permet à un attaquant de provoquer une élévation de privilèges et un contournement de la politique de sécurité.
L'éditeur a connaissance d'un rapport indiquant que la vulnérabilité a été exploitée sur des instances Confluence Data Center et Server accessibles depuis internet.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Atlassian | Confluence | Confluence Data Center et Confluence Server versions 8.4.x antérieures à 8.4.3 | ||
| Atlassian | Confluence | Confluence Data Center et Confluence Server versions 8.0.x à 8.3.x antérieures à 8.3.3 | ||
| Atlassian | Confluence | Confluence Data Center et Confluence Server versions 8.5.x antérieures à 8.5.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Confluence Data Center et Confluence Server versions 8.4.x ant\u00e9rieures \u00e0 8.4.3",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center et Confluence Server versions 8.0.x \u00e0 8.3.x ant\u00e9rieures \u00e0 8.3.3",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
},
{
"description": "Confluence Data Center et Confluence Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.2",
"product": {
"name": "Confluence",
"vendor": {
"name": "Atlassian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-22515",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22515"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0803",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-05T00:00:00.000000"
},
{
"description": "Ajout du risque \"Contournement de la politiique de s\u00e9curit\u00e9\" suite \u00e0 la mise \u00e0 jour de l\u0027avis par l\u0027\u00e9diteur.",
"revision_date": "2023-10-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Atlassian Confluence. Elle\npermet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges et un\ncontournement de la politique de s\u00e9curit\u00e9.\n\nL\u0027\u00e9diteur a connaissance d\u0027un rapport indiquant que la vuln\u00e9rabilit\u00e9 a\n\u00e9t\u00e9 exploit\u00e9e sur des instances Confluence Data Center et Server\naccessibles depuis internet.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Atlassian Confluence",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Atlassian 1295682276 du 04 octobre 2023",
"url": "https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html"
}
]
}
WID-SEC-W-2023-2700
Vulnerability from csaf_certbund - Published: 2023-10-17 22:00 - Updated: 2023-12-12 23:00In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuführen oder einen Denial of Service Zustand herbeizuführen. Für die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Atlassian Bamboo < 9.3.5
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.3.5
|
— | |
|
Atlassian Confluence < 8.4.5
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.4.5
|
— | |
|
Atlassian Confluence < 8.6.2
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.6.2
|
— | |
|
Atlassian Bitbucket < 7.21.18
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:7.21.18
|
— | |
|
Atlassian Confluence < 8.5.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.5.4
|
— | |
|
Atlassian Bitbucket < 8.9.7
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.9.7
|
— | |
|
Atlassian Confluence < 8.7.1
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.7.1
|
— | |
|
Atlassian Bamboo < 9.2.7
Atlassian / Bamboo
|
cpe:/a:atlassian:bamboo:9.2.7
|
— | |
|
Atlassian Confluence < 8.3.4
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:8.3.4
|
— | |
|
Atlassian Bitbucket < 8.12.4
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.12.4
|
— | |
|
Atlassian Bitbucket < 8.11.6
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.11.6
|
— | |
|
Atlassian Jira Software Service Management < 4.20.28
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__4.20.28
|
— | |
|
Atlassian Bitbucket < 8.14.2
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.14.2
|
— | |
|
Atlassian Jira Software < 9.4.13
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:9.4.13
|
— | |
|
Atlassian Bitbucket < 8.13.3
Atlassian / Bitbucket
|
cpe:/a:atlassian:bitbucket:8.13.3
|
— | |
|
Atlassian Confluence < 7.19.17
Atlassian / Confluence
|
cpe:/a:atlassian:confluence:7.19.17
|
— | |
|
Atlassian Jira Software Service Management < 5.4.12
Atlassian / Jira Software
|
cpe:/a:atlassian:jira_software:service_management__5.4.12
|
— |
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Confluence ist eine kommerzielle Wiki-Software.\r\nJira ist eine Webanwendung zur Softwareentwicklung.\r\nBitbucket ist ein Git-Server zur Sourcecode-Versionskontrolle.\r\nBamboo ist ein Werkzeug zur kontinuierlichen Integration und Bereitstellung, das automatisierte Builds, Tests und Freigaben in einem einzigen Arbeitsablauf verbindet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2700 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2700.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2700 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2700"
},
{
"category": "external",
"summary": "Atlassian Security Update vom 2023-10-17",
"url": "https://confluence.atlassian.com/security/security-bulletin-october-17-2023-1299929380.html"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin December 12 2023 vom 2023-12-12",
"url": "https://confluence.atlassian.com/security/security-bulletin-december-12-2023-1319249520.html"
}
],
"source_lang": "en-US",
"title": "Atlassian Confluence: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-12-12T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:00:13.228+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2700",
"initial_release_date": "2023-10-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-10-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-12-12T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Atlassian Bamboo \u003c 9.2.7",
"product": {
"name": "Atlassian Bamboo \u003c 9.2.7",
"product_id": "1529586",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:9.2.7"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bamboo \u003c 9.2.5 Data Center and Server",
"product": {
"name": "Atlassian Bamboo \u003c 9.2.5 Data Center and Server",
"product_id": "T030667",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:9.2.5_data_center_and_server"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bamboo \u003c 9.3.1 Data Center and Server",
"product": {
"name": "Atlassian Bamboo \u003c 9.3.1 Data Center and Server",
"product_id": "T030668",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:9.3.1_data_center_and_server"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bamboo \u003c 9.3.3 Data Center and Server",
"product": {
"name": "Atlassian Bamboo \u003c 9.3.3 Data Center and Server",
"product_id": "T030669",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:9.3.3_data_center_and_server"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bamboo \u003c 9.3.5",
"product": {
"name": "Atlassian Bamboo \u003c 9.3.5",
"product_id": "T031324",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bamboo:9.3.5"
}
}
}
],
"category": "product_name",
"name": "Bamboo"
},
{
"branches": [
{
"category": "product_name",
"name": "Atlassian Bitbucket \u003c 8.13.1 Data Center and Server",
"product": {
"name": "Atlassian Bitbucket \u003c 8.13.1 Data Center and Server",
"product_id": "T030666",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.13.1_data_center_and_server"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bitbucket \u003c 7.21.18",
"product": {
"name": "Atlassian Bitbucket \u003c 7.21.18",
"product_id": "T031325",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:7.21.18"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bitbucket \u003c 8.9.7",
"product": {
"name": "Atlassian Bitbucket \u003c 8.9.7",
"product_id": "T031614",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.9.7"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bitbucket \u003c 8.11.6",
"product": {
"name": "Atlassian Bitbucket \u003c 8.11.6",
"product_id": "T031615",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.11.6"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bitbucket \u003c 8.12.4",
"product": {
"name": "Atlassian Bitbucket \u003c 8.12.4",
"product_id": "T031616",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.12.4"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bitbucket \u003c 8.13.3",
"product": {
"name": "Atlassian Bitbucket \u003c 8.13.3",
"product_id": "T031617",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.13.3"
}
}
},
{
"category": "product_name",
"name": "Atlassian Bitbucket \u003c 8.14.2",
"product": {
"name": "Atlassian Bitbucket \u003c 8.14.2",
"product_id": "T031618",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.14.2"
}
}
}
],
"category": "product_name",
"name": "Bitbucket"
},
{
"branches": [
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.3.3 Server and Data Center",
"product": {
"name": "Atlassian Confluence \u003c 8.3.3 Server and Data Center",
"product_id": "T030660",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.3.3_server_and_data_center"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.5.2 Server and Data Center",
"product": {
"name": "Atlassian Confluence \u003c 8.5.2 Server and Data Center",
"product_id": "T030662",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.5.2_server_and_data_center"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.4.3 Server and Data Center",
"product": {
"name": "Atlassian Confluence \u003c 8.4.3 Server and Data Center",
"product_id": "T030663",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.4.3_server_and_data_center"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.3.4",
"product": {
"name": "Atlassian Confluence \u003c 8.3.4",
"product_id": "T030846",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.3.4"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 7.19.17",
"product": {
"name": "Atlassian Confluence \u003c 7.19.17",
"product_id": "T031609",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:7.19.17"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.4.5",
"product": {
"name": "Atlassian Confluence \u003c 8.4.5",
"product_id": "T031610",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.4.5"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.5.4",
"product": {
"name": "Atlassian Confluence \u003c 8.5.4",
"product_id": "T031611",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.5.4"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.6.2",
"product": {
"name": "Atlassian Confluence \u003c 8.6.2",
"product_id": "T031612",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.6.2"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.7.1",
"product": {
"name": "Atlassian Confluence \u003c 8.7.1",
"product_id": "T031613",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.7.1"
}
}
}
],
"category": "product_name",
"name": "Confluence"
},
{
"branches": [
{
"category": "product_name",
"name": "Atlassian Jira Software \u003c 4.20.27 Service Management Data Center and Server",
"product": {
"name": "Atlassian Jira Software \u003c 4.20.27 Service Management Data Center and Server",
"product_id": "T030664",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira_software:4.20.27_service_management_data_center_and_server"
}
}
},
{
"category": "product_name",
"name": "Atlassian Jira Software \u003c 5.4.11 Service Management Data Center and Server",
"product": {
"name": "Atlassian Jira Software \u003c 5.4.11 Service Management Data Center and Server",
"product_id": "T030665",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira_software:5.4.11_service_management_data_center_and_server"
}
}
},
{
"category": "product_name",
"name": "Atlassian Jira Software \u003c 9.4.13",
"product": {
"name": "Atlassian Jira Software \u003c 9.4.13",
"product_id": "T031606",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira_software:9.4.13"
}
}
},
{
"category": "product_name",
"name": "Atlassian Jira Software Service Management \u003c 4.20.28",
"product": {
"name": "Atlassian Jira Software Service Management \u003c 4.20.28",
"product_id": "T031607",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira_software:service_management__4.20.28"
}
}
},
{
"category": "product_name",
"name": "Atlassian Jira Software Service Management \u003c 5.4.12",
"product": {
"name": "Atlassian Jira Software Service Management \u003c 5.4.12",
"product_id": "T031608",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:jira_software:service_management__5.4.12"
}
}
}
],
"category": "product_name",
"name": "Jira Software"
}
],
"category": "vendor",
"name": "Atlassian"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-28709",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2023-28709"
},
{
"cve": "CVE-2023-25194",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2023-25194"
},
{
"cve": "CVE-2023-22515",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2023-22515"
},
{
"cve": "CVE-2023-22514",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2023-22514"
},
{
"cve": "CVE-2023-1370",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2022-45688",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-45688"
},
{
"cve": "CVE-2022-45685",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-45685"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-41906",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-41906"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-3509",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-3509"
},
{
"cve": "CVE-2022-3171",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-3171"
},
{
"cve": "CVE-2022-25647",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2021-46877",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2021-46877"
},
{
"cve": "CVE-2021-31684",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2021-31684"
},
{
"cve": "CVE-2021-22569",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2021-22569"
},
{
"cve": "CVE-2020-36518",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2020-36518"
},
{
"cve": "CVE-2020-13936",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2020-13936"
},
{
"cve": "CVE-2019-13990",
"notes": [
{
"category": "description",
"text": "In Atlassian Confluence, Atlassian Jira Software, Atlassian Bitbucket und Atlassian Bamboo existieren mehrere Schwachstellen. Diese Schwachstellen bestehen teilweise in Komponenten von Drittanbietern und sind nicht im Detail beschrieben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Administratorrechte zu erlangen, Informationen offenzulegen, beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T031324",
"T031610",
"T031612",
"T031325",
"T031611",
"T031614",
"T031613",
"1529586",
"T030846",
"T031616",
"T031615",
"T031607",
"T031618",
"T031606",
"T031617",
"T031609",
"T031608"
]
},
"release_date": "2023-10-17T22:00:00.000+00:00",
"title": "CVE-2019-13990"
}
]
}
WID-SEC-W-2023-2555
Vulnerability from csaf_certbund - Published: 2023-10-04 22:00 - Updated: 2023-10-04 22:00Es besteht eine Schwachstelle in Atlassian Confluence. Dieser Fehler besteht im Data Center und im Server, da es möglich ist, nicht autorisierte Confluence-Administratorkonten zu erstellen und auf Confluence-Instanzen zuzugreifen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern.
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Confluence ist eine kommerzielle Wiki-Software.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Atlassian Confluence ausnutzen, um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2555 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2555.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2555 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2555"
},
{
"category": "external",
"summary": "Atlassian Confluence Security Notification vom 2023-10-04",
"url": "https://github.com/advisories/GHSA-g458-xvmc-qg2r"
},
{
"category": "external",
"summary": "Atlassian Confluence Security Notification vom 2023-10-04",
"url": "https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html"
}
],
"source_lang": "en-US",
"title": "Atlassian Confluence Data Center and Server: Schwachstelle erm\u00f6glicht Privilegieneskalation",
"tracking": {
"current_release_date": "2023-10-04T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:59:25.476+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2555",
"initial_release_date": "2023-10-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-10-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.3.3",
"product": {
"name": "Atlassian Confluence \u003c 8.3.3",
"product_id": "T030222",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.3.3"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.4.3",
"product": {
"name": "Atlassian Confluence \u003c 8.4.3",
"product_id": "T030223",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.4.3"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003c 8.5.2",
"product": {
"name": "Atlassian Confluence \u003c 8.5.2",
"product_id": "T030224",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.5.2"
}
}
},
{
"category": "product_name",
"name": "Atlassian Confluence \u003e 8.0.0",
"product": {
"name": "Atlassian Confluence \u003e 8.0.0",
"product_id": "T030225",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:confluence:8.0.0"
}
}
}
],
"category": "product_name",
"name": "Confluence"
}
],
"category": "vendor",
"name": "Atlassian"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-22515",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in Atlassian Confluence. Dieser Fehler besteht im Data Center und im Server, da es m\u00f6glich ist, nicht autorisierte Confluence-Administratorkonten zu erstellen und auf Confluence-Instanzen zuzugreifen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um seine Privilegien zu erweitern."
}
],
"release_date": "2023-10-04T22:00:00.000+00:00",
"title": "CVE-2023-22515"
}
]
}
GHSA-G458-XVMC-QG2R
Vulnerability from github – Published: 2023-10-04 15:30 – Updated: 2025-10-22 00:32Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
For more details, please review the linked advisory on this CVE.
{
"affected": [],
"aliases": [
"CVE-2023-22515"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-10-04T14:15:10Z",
"severity": "CRITICAL"
},
"details": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.\n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. \n\nFor more details, please review the linked advisory on this CVE.",
"id": "GHSA-g458-xvmc-qg2r",
"modified": "2025-10-22T00:32:51Z",
"published": "2023-10-04T15:30:34Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22515"
},
{
"type": "WEB",
"url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
},
{
"type": "WEB",
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
},
{
"type": "WEB",
"url": "https://jira.atlassian.com/browse/CONFSERVER-92457"
},
{
"type": "WEB",
"url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2023-22515
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-22515",
"id": "GSD-2023-22515"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-22515"
],
"details": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. ",
"id": "GSD-2023-22515",
"modified": "2023-12-13T01:20:42.624654Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"ID": "CVE-2023-22515",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Confluence Data Center",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "\u003c 8.0.0"
},
{
"status": "affected",
"version": "\u003e= 8.0.0"
},
{
"status": "affected",
"version": "\u003e= 8.0.1"
},
{
"status": "affected",
"version": "\u003e= 8.0.2"
},
{
"status": "affected",
"version": "\u003e= 8.0.3"
},
{
"status": "affected",
"version": "\u003e= 8.1.3"
},
{
"status": "affected",
"version": "\u003e= 8.1.4"
},
{
"status": "affected",
"version": "\u003e= 8.2.0"
},
{
"status": "affected",
"version": "\u003e= 8.2.1"
},
{
"status": "affected",
"version": "\u003e= 8.2.2"
},
{
"status": "affected",
"version": "\u003e= 8.2.3"
},
{
"status": "affected",
"version": "\u003e= 8.3.0"
},
{
"status": "affected",
"version": "\u003e= 8.3.1"
},
{
"status": "affected",
"version": "\u003e= 8.3.2"
},
{
"status": "affected",
"version": "\u003e= 8.4.0"
},
{
"status": "affected",
"version": "\u003e= 8.4.1"
},
{
"status": "affected",
"version": "\u003e= 8.4.2"
},
{
"status": "affected",
"version": "\u003e= 8.5.0"
},
{
"status": "affected",
"version": "\u003e= 8.5.1"
},
{
"status": "unaffected",
"version": "\u003e= 8.3.3"
},
{
"status": "unaffected",
"version": "\u003e= 8.4.3"
},
{
"status": "unaffected",
"version": "\u003e= 8.5.2"
}
]
}
}
]
}
},
{
"product_name": "Confluence Server",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "\u003c 8.0.0"
},
{
"status": "affected",
"version": "\u003e= 8.0.0"
},
{
"status": "affected",
"version": "\u003e= 8.0.1"
},
{
"status": "affected",
"version": "\u003e= 8.0.2"
},
{
"status": "affected",
"version": "\u003e= 8.0.3"
},
{
"status": "affected",
"version": "\u003e= 8.1.3"
},
{
"status": "affected",
"version": "\u003e= 8.1.4"
},
{
"status": "affected",
"version": "\u003e= 8.2.0"
},
{
"status": "affected",
"version": "\u003e= 8.2.1"
},
{
"status": "affected",
"version": "\u003e= 8.2.2"
},
{
"status": "affected",
"version": "\u003e= 8.2.3"
},
{
"status": "affected",
"version": "\u003e= 8.3.0"
},
{
"status": "affected",
"version": "\u003e= 8.3.1"
},
{
"status": "affected",
"version": "\u003e= 8.3.2"
},
{
"status": "affected",
"version": "\u003e= 8.4.0"
},
{
"status": "affected",
"version": "\u003e= 8.4.1"
},
{
"status": "affected",
"version": "\u003e= 8.4.2"
},
{
"status": "affected",
"version": "\u003e= 8.5.0"
},
{
"status": "affected",
"version": "\u003e= 8.5.1"
},
{
"status": "unaffected",
"version": "\u003e= 8.3.3"
},
{
"status": "unaffected",
"version": "\u003e= 8.4.3"
},
{
"status": "unaffected",
"version": "\u003e= 8.5.2"
}
]
}
}
]
}
}
]
},
"vendor_name": "Atlassian"
}
]
}
},
"credits": [
{
"lang": "en",
"value": "an Atlassian customer"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. "
}
]
},
"impact": {
"cvss": [
{
"baseScore": 10,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "BASM (Broken Authentication \u0026 Session Management)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
},
{
"name": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515",
"refsource": "MISC",
"url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
},
{
"name": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276",
"refsource": "MISC",
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
},
{
"name": "https://jira.atlassian.com/browse/CONFSERVER-92475",
"refsource": "MISC",
"url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"cisaActionDue": "2023-10-13",
"cisaExploitAdd": "2023-10-05",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.",
"cisaVulnerabilityName": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85B2AD9F-CBA6-4559-9AE3-5F76A9EC3B7F",
"versionEndExcluding": "8.3.3",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38F9918D-6848-4CD6-8096-4FB48C23818B",
"versionEndExcluding": "8.4.3",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D646BCF-214F-449D-AEEB-B253E8715394",
"versionEndExcluding": "8.5.2",
"versionStartIncluding": "8.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "970A3DA7-5114-4696-A93D-C3D5AFF5C6C5",
"versionEndExcluding": "8.3.3",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2EB19CD-AE29-4775-91C5-05B01A96AC6C",
"versionEndExcluding": "8.4.3",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79229BE7-0AA0-4308-8BB2-8FB11E8B9AD7",
"versionEndExcluding": "8.5.2",
"versionStartIncluding": "8.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. \r\n\r\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. "
},
{
"lang": "es",
"value": "Atlassian ha sido informado de un problema informado por un pu\u00f1ado de clientes en el que atacantes externos pueden haber explotado una vulnerabilidad previamente desconocida en instancias de Confluence Data Center and Server de acceso p\u00fablico para crear cuentas de administrador de Confluence no autorizadas y acceder a instancias de Confluence. Los sitios de Atlassian Cloud no se ven afectados por esta vulnerabilidad. Si se accede a su sitio de Confluence a trav\u00e9s de un dominio atlassian.net, est\u00e1 alojado en Atlassian y no es vulnerable a este problema."
}
],
"id": "CVE-2023-22515",
"lastModified": "2024-02-16T17:52:35.420",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "security@atlassian.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-04T14:15:10.440",
"references": [
{
"source": "security@atlassian.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html"
},
{
"source": "security@atlassian.com",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515"
},
{
"source": "security@atlassian.com",
"tags": [
"Vendor Advisory"
],
"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276"
},
{
"source": "security@atlassian.com",
"tags": [
"Vendor Advisory"
],
"url": "https://jira.atlassian.com/browse/CONFSERVER-92475"
}
],
"sourceIdentifier": "security@atlassian.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.