Atlassian Confluence versions 6.6.0 up to 6.6.12, 6.12.0 up to 6.12.3, 6.13.0 up to 6.13.3, and 6.14.0 up to 6.14.2 suffer from a server-side request forgery vulnerability via WebDAV and a remote code execution vulnerability via the Widget Connector macro.
6815f5ede86e6165662c3fa9e98b1bc174808159c2c011d507237ad6bf678d74
This Metasploit module exploits an OGNL injection in Atlassian Confluence servers. A specially crafted URI can be used to evaluate an OGNL expression resulting in OS command execution.
648d8ece02bf7d7dd92d3c2ff78f2d3824ad3f28474f3d288194a271823bc243
Proof of concept script that exploits the remote code execution vulnerability affecting Atlassian Confluence versions 7.18 and below. The OGNL injection vulnerability allows an unauthenticated user to execute arbitrary code on a Confluence Server or Data Center instance. All supported versions of Confluence Server and Data Center are affected. Confluence Server and Data Center versions after 1.3.0 and below 7.18.1 are affected. The vulnerability has a CVSS score of 10 out of 10 for criticality.
af35a5a0af240395f62e977601885f29387ee4fc958081d1910e6f6f0d3d428a
Through the Wire is a proof of concept exploit for CVE-2022-26134, an OGNL injection vulnerability affecting Atlassian Confluence Server and Data Center versions 7.13.6 LTS and below and versions 7.18.0 "Latest" and below. This was originally a zero-day exploited in-the-wild.
942e5b3f32027294cb480a1f6e34ca8ed1933380c4aa4a79161e45a5c6ec7cbc
Confluence suffers from a pre-authentication remote code execution vulnerability that is leveraged via OGNL injection. All 7.4.17 versions before 7.18.1 are affected.
26aa29ff2f763421c60482664f517397136737aa76c3603580bd9bdd40a7e339
Atlassian Confluence Server version 7.5.1 suffers from a pre-authorization arbitrary file read vulnerability.
7f693737140518ca2e42f870252d34d097ff4d86974a396354174c05e262de77
This Metasploit module exploits an OGNL injection in Atlassian Confluence's WebWork component to execute commands as the Tomcat user.
78b308738c153a19545165ba47b4b15d6c0473eedcb99a8170d7a8e03183480a
Confluence Server version 7.12.4 unauthenticated OGNL injection remote code execution exploit.
edfa2004247afa5b006485a948fb93b61c91fbe8e09997fd1180dcd5758b7ddc
Atlassian Confluence version 6.12.1 suffers from a Widget Connector Macro template injection vulnerability.
888ab1e7f8753b1713aba7f23fe7c61f5e0d5096cc4c393063a6c530b5041be2
Multiple Atlassian products suffer from persistent cross site scripting vulnerabilities. Vulnerable products include PlantUML version 6.43, Refined Toolkit for Confluence version 2.2.5, Linking for Confluence version 5.5.3, Countdown Timer version 1.7.0, and Server Status version 1.2.1.
ce9579674629da339f235d6da72456d507989a8ca7f24f0714d41988b64f5ec5
Atlassian Confluence suffers from a man-in-the-middle vulnerability. Versions affected include the 6.x.x and 7.x.x releases.
210e5ceb62fd144e2e3a8982f12780c0009868a791ee1c6d03db5bed99a58027
This Metasploit module exploits an arbitrary file write via path traversal in Atlassian Confluence version 6.15.1.
d2fb70ba3470e338be2bae4c02f18ab5e964209f489dbcd1a68c854b6c395754
Atlassian Confluence version 6.15.1 suffers from a directory traversal vulnerability.
4106001184da51387e3e4059edb3838562eb5e9c7b8cce39902ee7eefe2e2393
Confluence Server versions 6.1.0 up to 6.6.16, 6.7.0 up to 6.13.7, and 6.14.0 up to 6.15.8 suffer from a file disclosure vulnerability.
63bb40486cc6b4b0d9ad286552ee4301273147e9803d97e67d4568a9f4d18289
Confluence Server and Confluence Data Center suffer from a path traversal vulnerability in the downloadallattachments resource. Versions affected include 6.6.0 up to 6.6.13, 6.7.0 up to 6.12.4, 6.13.0 up to 6.13.4, 6.14.0 up to 6.14.3, and 6.15.0 up to 6.15.2.
54a6bf44997071eacfb8aca90470a91c600400151badba57559e2a382f7bcf17
Widget Connector Macro is part of Atlassian Confluence Server and Data Center that allows embed online videos, slideshows, photostreams and more directly into page. A _template parameter can be used to inject remote Java code into a Velocity template, and gain code execution. Authentication is not required to exploit this vulnerability. By default, Java payload will be used because it is cross-platform, but you can also specify which native payload you want (Linux or Windows). Confluence before version 6.6.12, from version 6.7.0 before 6.12.3, from version 6.13.0 before 6.13.3 and from version 6.14.0 before 6.14.2 are affected.
f4c247f9a9679d32c545b710244463bf290d04f611d0ecce6a6427fde7c101ef
Atlassian Confluence versions 4.3.0 through 6.1.1 suffers from an access restriction bypass vulnerability.
4dabd17e0386e88f135cea2a27fb3c57e3c86da303813116e6f89462e7a9db50
The Confluence drafts diff rest resource made the current content of all blogs and pages in Confluence available without authentication. Attackers who can access the Confluence web interface of a vulnerable version can use this vulnerability to obtain the content of all blogs and pages inside Confluence. All versions of Confluence starting with version 6.0.0 but less than 6.0.7 (the fixed version for 6.0.x) are affected by this vulnerability.
81936b182168b27dc4d9e1c13e26ed7b479fb032c93be23162cb3365c172323e
Tempest Security Intelligence Advisory ADV-3/2016 - Atlassian Confluence version 5.9.12 is vulnerable to persistent cross site scripting because it fails to securely validate user controlled data, thus making it possible for an attacker to supply crafted input in order to harm users. The bug occurs at pages carrying attached files, even though the attached file name parameter is correctly sanitized upon submission, it is possible for an attacker to later edit the attached file name property and supply crafted data (i.e HTML tags and script code) without the occurrence of any security checks, resulting in an exploitable persistent cross site scripting injection.
b7c9fe6c8eaa94e134b1dc2d3d55abb58e7032c8a8e95037f6724a83d1807475
Atlassian Confluence AppFusions Doxygen versions 1.3.0, 1.3.1, 1.3.2, and 1.3.3 suffer from a cross site scripting vulnerability.
58c57bd896a1b741f14676780ed0548bea2bc4824bf165be69c2d7dd293e7f52
Atlassian Confluence AppFusions Doxygen versions 1.3.0, 1.3.1, 1.3.2, and 1.3.3 suffer from an information disclosure vulnerability.
8357c39588ad5506639d97020e1806800b3080757eee8fa79931e45eb66d5148
Atlassian Confluence AppFusions Doxygen version 1.3.0 suffers from a path traversal vulnerability.
77aa28687a473275fa3261bb168ee38f7a5939fe9c9aa294dd42f3b61e038e76
Atlassian Confluence suffers from cross site scripting and insecure direct object reference vulnerabilities. The cross site scripting affects versions 5.2, 5.8.14, and 5.8.15. The reference vulnerability affects versions 5.9.1, 5.8.14, and 5.8.15.
2da920a30b4bdb3ec3de313cde7032f75edc992f015e2622f7f3b2e30469ed44
Confluence RefinedWiki Original Theme versions 3.x through 4.0.x suffer from a persistent cross site scripting vulnerability.
f917e1fa23a7e5c921a521ba75b0eacfb0097970bf2bf78cc985cbf2ace18001
Atlassian Confluence versions 3.x and 4.x allow for anonymous users to list all registered users of the system. The vendor does not believe this is a security concern.
4a4c16d6b5e27d2551991426235eaa47ad13ed9c1e9766bd8e50813c068e0802
Atlassian Confluence versions 3.5.6 through 5.3 suffer from a cross site scripting vulnerability.
134e7eac520cc20aea86f2b420492abe84f6288beee1c6ba0561fd1835097ec4