Vulnerability

Atlassian Confluence vulnerability

This live blog contains information regarding the Atlassian Confluence vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on June 8, 2022.

Clip path group@2x

T-Update

Information about vulnerabilities

This live blog contains information regarding the Atlassian Confluence vulnerability. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog. Last updated on June 8, 2022.

Update June 8, 2022

16:00 |Meanwhile, updates are available. The advice is to install them as soon as possible. If patching is not possible, Atlassian has described a number of additional mitigating measures.

Update June 3, 2022

13:00 | On the 2th of June 2022, Atlassian released a security advisory regarding a new vulnerability in the Confluence Server and Data Center applications, referred to as CVE-2022-26134. The vulnerability is rated with a critical severity and allows an unauthenticated attacker to execute code remotely.

Atlassian warns that CVE-2022-26134 is actively being exploited. Currently there are no updates available, and it is advised to apply mitigative actions as described in the security advisory as soon as possible.

Customized cyber security

Background

On the 2th of June 2022, Atlassian released a security advisory regarding a new vulnerability in the Confluence Server and Data Center applications, referred to as CVE-2022-26134. This vulnerability allows an unauthenticated attacker to execute code remotely. This vulnerability is rated as critical by Atlassian and implies a high risk of exploitation with high impact.

Risk

Based on the Atlassian security advisory all supported versions on Confluence Server and Confluence Data Center are affected. It’s likely that all unsupported versions are affected, but this has still to be confirmed by Atlassian.

Currently there is no patch available for CVE-2022-26134. In the absence of a patch, it is recommended to restrict access to Confluence Server and Data Center instances from the internet.

If you are unable to restrict access to the instances, then it is advised to implement a Web Application Firewall (WAF) rule which blocks URLS containing ${.

For more information, please refer to the Atlassian Security Advisory.

Advice

Sources

Ellipse 6

Sign up to receive T-Updates

Receive the latest vulnerabilities in your email every Wednesday

More than 1,000 organisations have already joined us.

Tesorion gebruikt jouw gegevens voor het versturen van de gevraagde informatie. Daarnaast worden je gegevens mogelijk gebruikt voor commerciële opvolging. Je kunt je op elk gewenst moment hiervoor afmelden via de link in de e-mail. Lees voor meer informatie ons privacybeleid.

Ellipse 6