Логотип exploitDog
product: "confluence_server"
Консоль
Логотип exploitDog

exploitDog

product: "confluence_server"
Atlassian Confluence Server

Atlassian Confluence Serverтиражируемая вики-система для внутреннего использования организациями с целью создания единой базы знаний.

Релизный цикл, информация об уязвимостях

Продукт: Atlassian Confluence Server
Вендор: atlassian

График релизов

8.58.68.78.88.99.09.19.29.39.49.510.0202320242025202620272028

Недавние уязвимости Atlassian Confluence Server

Количество 100

github логотип

GHSA-qv34-rfhx-fg2q

больше 3 лет назад

Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.

CVSS3: 8.8
EPSS: Критический
github логотип

GHSA-8mjc-qhq2-3xm8

больше 3 лет назад

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

CVSS3: 5.3
EPSS: Критический
github логотип

GHSA-9gqc-c5m8-vf5q

больше 3 лет назад

Affected versions of Confluence Server before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-xvv9-f9hm-rghr

больше 3 лет назад

Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-889g-gr2g-424w

больше 3 лет назад

The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-98cv-g579-8fm6

больше 3 лет назад

The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-5m64-chxv-wxq3

больше 3 лет назад

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-fxvf-vgj9-gphr

больше 3 лет назад

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-jp4c-chxh-7gcg

больше 3 лет назад

Atlassian Confluence Server and Data Center before version 7.5.1 allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros.

EPSS: Низкий
github логотип

GHSA-65gh-pwxv-875j

больше 3 лет назад

The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
github логотип
GHSA-qv34-rfhx-fg2q

Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.

CVSS3: 8.8
94%
Критический
больше 3 лет назад
github логотип
GHSA-8mjc-qhq2-3xm8

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

CVSS3: 5.3
94%
Критический
больше 3 лет назад
github логотип
GHSA-9gqc-c5m8-vf5q

Affected versions of Confluence Server before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-xvv9-f9hm-rghr

Affected versions of Team Calendar in Confluence Server before 7.11.0 allow attackers to inject arbitrary HTML or Javascript via a Cross Site Scripting Vulnerability in admin global setting parameters.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-889g-gr2g-424w

The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.

CVSS3: 4.3
9%
Низкий
больше 3 лет назад
github логотип
GHSA-98cv-g579-8fm6

The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
github логотип
GHSA-5m64-chxv-wxq3

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the avatar upload feature. The affected versions are before version 7.2.0.

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-fxvf-vgj9-gphr

Affected versions of Atlassian Confluence Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in user macro parameters. The affected versions are before version 7.4.2, and from version 7.5.0 before 7.5.2.

CVSS3: 5.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-jp4c-chxh-7gcg

Atlassian Confluence Server and Data Center before version 7.5.1 allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros.

0%
Низкий
больше 3 лет назад
github логотип
GHSA-65gh-pwxv-875j

The attachment-uploading feature in Atlassian Confluence Server from version 6.14.0 through version 6.14.3, and version 6.15.0 before version 6.15.5 allows remote attackers to achieve stored cross-site- scripting (SXSS) via a malicious attachment with a modified `mimeType` parameter.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу


Поделиться