QID 730172

Date Published: 2021-08-27

QID 730172: Confluence Server Webwork OGNL Injection Vulnerabilty (CONFSERVER-67940)

An OGNL injection vulnerability exists in Confluence Server that could allow an authenticated user, and in some instances unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance.

Affected versions:
Confluence Server prior to version 6.13.23
Confluence Server version 6.14.0 to 7.4.11
Confluence Server version 7.5.0 to 7.11.5
Confluence Server version 7.12.0 to 7.12.5
Note: We do not support EAP and beta versions.

QID Detection Logic(Unauthenticated):
1. This QID sends a crafted HTTP POST request to "pages/createpage-entervariables.action" and/or "pages/doenterpagevariables.action" to check if the target is vulnerable.
2. When aforementioned technique doesn't work, it checks for vulnerable version of Atlassian Confluence using GET request to login.action page.

Sucessful exploitation of the vulnerability will allow an authenticated use and is some cases an unauthenticated user to execute arbitrary code.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to refer to upgrade to Atlassian Confluence Server or later versions to remediate this vulnerability.

    Vendor References

    CVEs related to QID 730172

    Software Advisories
    Advisory ID Software Component Link
    CONFSERVER-67940 URL Logo jira.atlassian.com/browse/CONFSERVER-67940