Rapid7 Vulnerability & Exploit Database

Atlassian Confluence: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CVE-2021-39114)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Atlassian Confluence: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CVE-2021-39114)

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
04/05/2022
Created
04/29/2022
Added
04/29/2022
Modified
03/08/2023

Description

Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.

Solution(s)

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;