QID 375839

Date Published: 2021-09-09

QID 375839: Confluence Server Webwork Object-Graph Navigation Language (OGNL) Injection Vulnerabilty (CONFSERVER-67940) (Authenticated Check)

An OGNL injection vulnerability exists in Confluence Server that could allow an authenticated user, and in some instances unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance.

Affected versions:
Confluence Server prior to version 6.13.23
Confluence Server version 6.14.0 to 7.4.11
Confluence Server version 7.5.0 to 7.11.5
Confluence Server version 7.12.0 to 7.12.5
Note: We do not support EAP and beta versions.

QID Detection Logic(Authenticated):
Windows: QID looks for vulnerable version of Confluence Server by searching in registry key "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" for 32-bit and "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" for 64-bit.

Successful exploitation of the vulnerability will allow an authenticated use and is some cases an unauthenticated user to execute arbitrary code.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to refer to upgrade to Atlassian Confluence Server or later versions to remediate this vulnerability.

    Vendor References

    CVEs related to QID 375839

    Software Advisories
    Advisory ID Software Component Link
    CONFSERVER-67940 URL Logo jira.atlassian.com/browse/CONFSERVER-67940