Логотип exploitDog
product: "confluence_server"
Консоль
Логотип exploitDog

exploitDog

product: "confluence_server"
Atlassian Confluence Server

Atlassian Confluence Serverтиражируемая вики-система для внутреннего использования организациями с целью создания единой базы знаний.

Релизный цикл, информация об уязвимостях

Продукт: Atlassian Confluence Server
Вендор: atlassian

График релизов

8.58.68.78.88.99.09.19.29.39.49.5202320242025202620272028

Недавние уязвимости Atlassian Confluence Server

Количество 100

github логотип

GHSA-qv34-rfhx-fg2q

около 3 лет назад

Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.

CVSS3: 8.8
EPSS: Критический
github логотип

GHSA-8mjc-qhq2-3xm8

около 3 лет назад

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

CVSS3: 5.3
EPSS: Критический
github логотип

GHSA-xvv9-f9hm-rghr

около 3 лет назад

Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-9gqc-c5m8-vf5q

около 3 лет назад

Affected versions of Confluence Server before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-889g-gr2g-424w

около 3 лет назад

The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-98cv-g579-8fm6

около 3 лет назад

The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-5m64-chxv-wxq3

около 3 лет назад

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-fxvf-vgj9-gphr

около 3 лет назад

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-jp4c-chxh-7gcg

около 3 лет назад

Atlassian Confluence Server and Data Center before version 7.5.1 allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros.

EPSS: Низкий
github логотип

GHSA-65gh-pwxv-875j

около 3 лет назад

The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-qv34-rfhx-fg2q

Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.

CVSS3: 8.8
94%
Критический
около 3 лет назад
github логотип
GHSA-8mjc-qhq2-3xm8

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

CVSS3: 5.3
94%
Критический
около 3 лет назад
github логотип
GHSA-xvv9-f9hm-rghr

Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.

CVSS3: 5.4
0%
Низкий
около 3 лет назад
github логотип
GHSA-9gqc-c5m8-vf5q

Affected versions of Confluence Server before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.

CVSS3: 4.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-889g-gr2g-424w

The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.

CVSS3: 4.3
6%
Низкий
около 3 лет назад
github логотип
GHSA-98cv-g579-8fm6

The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-5m64-chxv-wxq3

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.

CVSS3: 6.5
1%
Низкий
около 3 лет назад
github логотип
GHSA-fxvf-vgj9-gphr

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.

CVSS3: 5.4
0%
Низкий
около 3 лет назад
github логотип
GHSA-jp4c-chxh-7gcg

Atlassian Confluence Server and Data Center before version 7.5.1 allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros.

0%
Низкий
около 3 лет назад
github логотип
GHSA-65gh-pwxv-875j

The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.

0%
Низкий
около 3 лет назад

Уязвимостей на страницу


Поделиться