Rapid7 Vulnerability & Exploit Database

Atlassian Confluence: Improper Neutralization of Special Elements in Output Used by a DownstreamComponent ('Injection') (CVE-2023-22522)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Atlassian Confluence: Improper Neutralization of Special Elements in Output Used by a DownstreamComponent ('Injection') (CVE-2023-22522)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
12/06/2023
Created
12/13/2023
Added
12/12/2023
Modified
12/13/2023

Description

This Template Injection vulnerability allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve Remote Code Execution (RCE) on an affected instance. Publicly accessible Confluence Data Center and Server versions as listed below are at risk and require immediate attention. See the advisory for additional details Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Solution(s)

  • atlassian-confluence-upgrade-7_19_17
  • atlassian-confluence-upgrade-8_4_5
  • atlassian-confluence-upgrade-8_5_4
  • atlassian-confluence-upgrade-8_6_2
  • atlassian-confluence-upgrade-8_7_1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;