Vulnerabilities

Atlassian Issues Second Warning on Potential Exploitation of Critical Confluence Flaw 

Atlassian warns that ‘critical information’ released on the Confluence bug CVE-2023-22518 increases the risk of exploitation.

Atlassian warns that ‘critical information’ released on the Confluence bug CVE-2023-22518 increases the risk of exploitation.

Enterprise software maker Atlassian on Thursday issued a fresh warning on the potential exploitation of a recent critical-severity vulnerability in Confluence Data Center and Confluence Server.

Tracked as CVE-2023-22518 (CVSS score of 9.1), the flaw is described as an improper authorization issue that could lead to severe data loss. All versions of the collaboration solution are affected.

Atlassian has released patches for the bug and the company’s CISO, Bala Sathiamurthy, on Monday urged organizations to apply the fixes as soon as possible, citing the severity of the bug.

“As part of our continuous security assessment processes, we have discovered that Confluence Data Center and Server customers are vulnerable to significant data loss if exploited by an unauthenticated attacker,” Sathiamurthy said.

On Thursday, the software maker updated its advisory to underline a heightened risk of exploitation following the public release of technical information on CVE-2023-22518 and potential exploitation vectors.

“As part of Atlassian’s ongoing monitoring of this CVE, we observed publicly posted critical information about the vulnerability which increases risk of exploitation,” the company said.

The fresh warning came on the same day as ProjectDiscovery published an analysis of the changes Atlassian made to address the flaw, which led them to identifying a method handler that lacks sufficient checks, allowing for authentication bypass if the correct parameters are supplied in a request.

ProjectDiscovery also released a detection-based template targeting the vulnerability and the timing of publication suggests that Atlassian was referring to this exploit code in their updated advisory.

Advertisement. Scroll to continue reading.

While there appears to be no evidence of in-the-wild exploitation of CVE-2023-22518, the critical severity of the bug demands quick action, the software vendor underlined.

“There are still no reports of an active exploit, though customers must take immediate action to protect their instances. If you already applied the patch, no further action is required,” Atlassian noted.

Confluence Data Center and Server versions 7.19.16, 8.3.4, 8.4.4, 8.5.3, and 8.6.1 contain the necessary fixes for this bug.

Related: Mass Exploitation of ‘Citrix Bleed’ Vulnerability Underway

Related: Attackers Exploiting Critical F5 BIG-IP Vulnerability

Related: Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data

Related Content

Vulnerabilities

Atlassian releases patches for two dozen vulnerabilities, including a critical-severity bug in Bamboo Data Center and Server.

Vulnerabilities

The Atlassian Confluence vulnerability CVE-2023-22527 is being exploited in the wild just days after it was disclosed. 

Vulnerabilities

Out-of-date Confluence Data Center and Server instances are haunted by a critical vulnerability leading to remote code execution.

Vulnerabilities

Atlassian has released patches for critical-severity remote code execution flaws in Confluence and other products.

Vulnerabilities

CISA, FBI, and MS-ISAC warn of potential widespread exploitation of CVE-2023-22515, a critical vulnerability in Atlassian Confluence.

Cyberwarfare

Microsoft says an APT group tracked as Storm-0062 has been hacking Confluence installations since mid-September, three weeks before Atlassian’s disclosure.

Application Security

Atlassian confirms that “a handful of customers” were hit by exploits targeting a remotely exploitable flaw in its Confluence Data Center and Server products.

Vulnerabilities

Atlassian has released patches for multiple high-severity vulnerabilities in Jira, Confluence, Bitbucket, and Bamboo products.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version