This High severity Remote Code Execution (RCE) vulnerability was introduced in versions 7.13.0 of Confluence Data Center and Server. Remote Code Execution (RCE) vulnerability, with a CVSS Score of 8.0 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H allows an authenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, high impact to availability, and does not require user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: * Confluence Data Center and Server 7.19: Upgrade to a release 7.19.18, or any higher 7.19.x release * Confluence Data Center and Server 8.5: Upgrade to a release 8.5.5 or any higher 8.5.x release * Confluence Data Center and Server 8.7: Upgrade to a release 8.7.2 or any higher release See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ).
History

Wed, 23 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:atlassian:confluence_data_center:-:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:-:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: atlassian

Published: 2024-01-16T05:00:00.724Z

Updated: 2024-10-23T15:24:02.784Z

Reserved: 2024-01-01T00:05:33.845Z

Link: CVE-2024-21673

cve-icon Vulnrichment

Updated: 2024-08-01T22:27:36.035Z

cve-icon NVD

Status : Analyzed

Published: 2024-01-16T05:15:08.730

Modified: 2024-01-22T14:50:35.133

Link: CVE-2024-21673

cve-icon Redhat

No data.