Improper Authorization Vulnerability In Confluence Data Center and Server

Improper Authorization Vulnerability In Confluence Data Center and Server

02 Nov 2023
As part of Atlassian's ongoing monitoring of this CVE, we observed publicly posted critical information about the vulnerability which increases risk of exploitation. There are still no reports of an active exploit, though customers must take immediate action to protect their instances.

31 Oct 2023
As part of our continuous security assessment processes, we have discovered that Confluence Data Center and Server customers are vulnerable to significant data loss if exploited by an unauthenticated attacker. There are no reports of active exploitation at this time; customers must take immediate action to protect their instances.

Protecting customers' instances is our top priority, and our prompt response demonstrates our dedication to ensuring the safety of our customers and your data. Atlassian is always reviewing security measures to reduce security risks and support our customers in taking timely action. Customers can expect to receive high-priority patches outside of our monthly advisory schedule as necessary. We believe that taking proactive action is the best approach and we appreciate your ongoing partnership.

Improper Authorization Vulnerability In Confluence Data Center and Server

Affected Systems

Affected Versions
This Improper Authorization vulnerability affects all versions prior to the listed fix versions of Confluence Data Center and Server. Atlassian recommends patching to the fixed LTS version or later.

Product Affected Versions
Confluence Data Center and Server All versions are affected

IoC’s

-

Recommended Solution(s)

-

Mitigations

Immediately patch to a fixed version Atlassian recommends that you patch each of your affected installations to one of the listed fixed versions (or the latest version) below.

Product Fixed Versions
Confluence Data Center and Server 7.19.16
8.3.4
8.4.4
8.5.3
8.6.1

CVE / CWE

CVE-2023-22518

Related Website(s)

* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.