We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-21683



Assigneratlassian
Reserved2024-01-01
Published2024-05-21
Updated2024-08-01

Description

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.  Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was found internally.

Problem types

RCE (Remote Code Execution)

Product status

8.9.0
affected

8.8.0 to 8.8.1
affected

8.7.1 to 8.7.2
affected

8.6.0 to 8.6.2
affected

8.5.0 to 8.5.8
affected

8.4.0 to 8.4.5
affected

8.3.0 to 8.3.4
affected

8.2.0 to 8.2.3
affected

8.1.0 to 8.1.4
affected

8.0.0 to 8.0.4
affected

7.20.0 to 7.20.3
affected

7.19.0 to 7.19.21
affected

8.9.1 to 8.9.2
unaffected

8.5.9 to 8.5.10
unaffected

7.19.22 to 7.19.23
unaffected

Credits

Atlassian

References

https://confluence.atlassian.com/pages/viewpage.action?pageId=1387867145

https://jira.atlassian.com/browse/CONFSERVER-95832

cve.org CVE-2024-21683

nvd.nist.gov CVE-2024-21683

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.