Atlassian Issues Second Warning on Potential Exploitation of Critical Confluence Flaw 

Atlassian Issues Second Warning on Potential Exploitation of Critical Confluence Flaw 

November 4, 2023 at 12:30PM

Enterprise software maker Atlassian has issued a warning on a critical-severity vulnerability in Confluence Data Center and Confluence Server. The flaw, tracked as CVE-2023-22518, could result in severe data loss due to an improper authorization issue. Atlassian has released patches for the bug and urges organizations to apply them promptly. Although there is no evidence of in-the-wild exploitation, immediate action is recommended to protect instances. The necessary fixes can be found in Confluence Data Center and Server versions 7.19.16, 8.3.4, 8.4.4, 8.5.3, and 8.6.1.

Meeting Notes Takeaways:

1. Atlassian, an enterprise software maker, has issued a warning about a critical-severity vulnerability in Confluence Data Center and Confluence Server.
2. The vulnerability, tracked as CVE-2023-22518, is an improper authorization issue that could result in severe data loss.
3. All versions of Confluence are affected by this flaw.
4. Atlassian has released patches for the bug and urges organizations to apply them as soon as possible.
5. Bala Sathiamurthy, Atlassian’s CISO, emphasized the severity of the bug and the potential for significant data loss if exploited.
6. Atlassian updated its advisory to highlight an increased risk of exploitation following the public release of technical information on the vulnerability.
7. ProjectDiscovery published an analysis of the changes made by Atlassian to address the flaw and identified a method handler without sufficient checks, allowing for authentication bypass under specific conditions.
8. ProjectDiscovery also released a detection-based template for the vulnerability, which Atlassian may have referred to in its updated advisory.
9. While there is no evidence of in-the-wild exploitation of the vulnerability, immediate action is still necessary due to its critical severity.
10. Atlassian specifies that customers who have already applied the patch do not need to take further action.
11. The necessary fixes for this bug are included in Confluence Data Center and Server versions 7.19.16, 8.3.4, 8.4.4, 8.5.3, and 8.6.1.

Full Article