Atlassian Confluence Authentication Bypass (CONFSERVER-93142) (Direct Check)

critical Nessus Plugin ID 185344

Synopsis

A web application is affected by an authentication bypass vulnerability.

Description

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Solution

Upgrade to Atlassian Confluence Server 8.6.1, 7.19.16, 8.5.3, 8.3.4, 8.4.4 or later.

See Also

http://www.nessus.org/u?38bb98d0

https://jira.atlassian.com/browse/CONFSERVER-93142

Plugin Details

Severity: Critical

ID: 185344

File Name: confluence_cve-2023-22518.nbin

Version: 1.26

Type: remote

Family: CGI abuses

Published: 11/8/2023

Updated: 11/22/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-22518

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:atlassian:confluence

Required KB Items: installed_sw/confluence

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 10/31/2023

Vulnerability Publication Date: 10/31/2023

CISA Known Exploited Vulnerability Due Dates: 11/28/2023

Exploitable With

Core Impact

Metasploit (Atlassian Confluence Unauth JSON setup-restore Improper Authorization leading to RCE (CVE-2023-22518))

Reference Information

CVE: CVE-2023-22518