Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Atlassian Issues Second Warning on Potential Exploitation of Critical Confluence Flaw 

Atlassian warns that ‘critical information’ released on the Confluence bug CVE-2023-22518 increases the risk of exploitation.

Enterprise software maker Atlassian on Thursday issued a fresh warning on the potential exploitation of a recent critical-severity vulnerability in Confluence Data Center and Confluence Server.

Tracked as CVE-2023-22518 (CVSS score of 9.1), the flaw is described as an improper authorization issue that could lead to severe data loss. All versions of the collaboration solution are affected.

Atlassian has released patches for the bug and the company’s CISO, Bala Sathiamurthy, on Monday urged organizations to apply the fixes as soon as possible, citing the severity of the bug.

“As part of our continuous security assessment processes, we have discovered that Confluence Data Center and Server customers are vulnerable to significant data loss if exploited by an unauthenticated attacker,” Sathiamurthy said.

On Thursday, the software maker updated its advisory to underline a heightened risk of exploitation following the public release of technical information on CVE-2023-22518 and potential exploitation vectors.

“As part of Atlassian’s ongoing monitoring of this CVE, we observed publicly posted critical information about the vulnerability which increases risk of exploitation,” the company said.

Advertisement. Scroll to continue reading.

The fresh warning came on the same day as ProjectDiscovery published an analysis of the changes Atlassian made to address the flaw, which led them to identifying a method handler that lacks sufficient checks, allowing for authentication bypass if the correct parameters are supplied in a request.

ProjectDiscovery also released a detection-based template targeting the vulnerability and the timing of publication suggests that Atlassian was referring to this exploit code in their updated advisory.

While there appears to be no evidence of in-the-wild exploitation of CVE-2023-22518, the critical severity of the bug demands quick action, the software vendor underlined.

“There are still no reports of an active exploit, though customers must take immediate action to protect their instances. If you already applied the patch, no further action is required,” Atlassian noted.

Confluence Data Center and Server versions 7.19.16, 8.3.4, 8.4.4, 8.5.3, and 8.6.1 contain the necessary fixes for this bug.

Related: Mass Exploitation of ‘Citrix Bleed’ Vulnerability Underway

Related: Attackers Exploiting Critical F5 BIG-IP Vulnerability

Related: Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.