QID 731081

Date Published: 2024-01-17

QID 731081: Atlassian Confluence Data Center and Server Remote Code Execution (RCE) Vulnerability (CONFSERVER-93833)

Atlassian Confluence is team collaboration software written in Java.

A template injection vulnerability on out-of-date versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected version. Customers using an affected version must take immediate action.

Affected products:
Confluence Data Center and Confluence Server

Affected version:
Confluence data center and server versions: 8.0.x,8.1.x,8.2.x,8.3.x,8.4.x,8.5.0-8.5.3

QID Detection Logic:(Unauthenticated)
This QID checks for vulnerable Atlassian Confluence targets by sending a crafted payload to the 'template/aui/text-inline.vm' endpoint and checks for code execution.


QID Detection Logic(Authenticated):
Operating System: (Windows) The QID checks for vulnerable versions of Confluence Server.BR> Note: The QID will only detect MSI installation on Windows.
Operating System: (Unix)
The QID checks for vulnerable versions of Confluence Server advised by the vendor.

Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code remotely, leading to complete system compromise.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to refer to CONFSERVER-93833 for updates pertaining to this vulnerability.

    CVEs related to QID 731081

    Software Advisories
    Advisory ID Software Component Link
    CONFSERVER-93833 URL Logo confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html