Overview
- Description
- All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
- Source
- security@atlassian.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
Known exploits
Data from CISA
- Vulnerability name
- Atlassian Confluence Data Center and Server Improper Authorization Vulnerability
- Exploit added on
- Nov 7, 2023
- Exploit action due
- Nov 28, 2023
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Weaknesses
- nvd@nist.gov
- CWE-863
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B807590-F41A-4F12-87DF-698D83853191", "versionEndExcluding": "7.19.16", "versionStartIncluding": "1.0.0" }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65733215-581D-4F2A-B023-899386A4A59C", "versionEndExcluding": "8.3.4", "versionStartIncluding": "7.20.0" }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56B04148-6AE0-4FD2-BD3D-B07A9E62F229", "versionEndExcluding": "8.4.4", "versionStartIncluding": "8.4.0" }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3660C634-0DB0-40B2-A905-1E00360A53FB", "versionEndExcluding": "8.5.3", "versionStartIncluding": "8.5.0" }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:8.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05E3896A-C145-44DB-8370-9263A139765D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E147060-0403-4D4C-8E87-453077B4C4CE", "versionEndExcluding": "7.19.16", "versionStartIncluding": "1.0.0" }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06FD0F88-133B-4421-8644-1948FDA2AA65", "versionEndExcluding": "8.3.4", "versionStartIncluding": "7.20.0" }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F459BB01-A089-4128-93AD-A71FE3B49E22", "versionEndExcluding": "8.4.4", "versionStartIncluding": "8.4.0" }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DA741B1-9AA7-42F6-8F50-32FE732D25D5", "versionEndExcluding": "8.5.3", "versionStartIncluding": "8.5.0" }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:8.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E995F8F6-E9A6-4076-8AE8-38A28A5F58D3" } ], "operator": "OR" } ] } ]