Rapid7 Vulnerability & Exploit Database

Atlassian Confluence: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CVE-2021-39114)

Back to Search

Atlassian Confluence: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CVE-2021-39114)

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
04/05/2022
Created
04/29/2022
Added
04/29/2022
Modified
04/29/2022

Description

Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.

Solution(s)

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;