Unknown Vulnerability Affects Confluence instances, External Attackers May Create Unauthorized Admin Accounts
CVE-2023-22515

9.8CRITICAL

Key Information:

Vendor
Atlassian
Vendor
CVE Published:
4 October 2023

Badges

💰 Ransomware👾 Exploit Exists🟡 Public PoC🟣 EPSS 96%🦅 CISA Reported📰 News Worthy

Summary

Atlassian has identified a vulnerability in its Confluence Data Center and Server products that allows external attackers to create unauthorized administrator accounts. This issue could enable malicious actors to gain unrestricted access to Confluence instances that are publicly accessible. It is important to note that Confluence Cloud sites, hosted under an atlassian.net domain, remain unaffected by this vulnerability. Organizations using the affected versions should address this security risk promptly to safeguard their data.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited and is known by the CISA as enabling ransomware campaigns.

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for evidence of compromise per vendor instructions and report any positive findings to CISA.

Affected Version(s)

Confluence Data Center >= 8.0.0 < 8.0.0

Confluence Data Center >= 8.0.1 >= 8.0.1

Confluence Data Center >= 8.0.2 >= 8.0.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Cve – InfoSec Write-ups

Read writing about Cve in InfoSec Write-ups. A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly...

6 months ago

Critical Atlassian Confluence zero-day exploited by attackers (CVE-2023-22515) - Help Net Security

Atlassian has fixed a critical zero-day vulnerability (CVE-2023-22515) in Confluence Data Center and Server under active exploitation.

1 year ago

Atlassian Confluence Critical Vulnerability - CVE-2023-22515

Atlassian, has fixed a privilege escalation vulnerability bug in Confluence Server and Datacenter editions. The vulnerability, tracked as CVE-2023-22515, attackers have already exploited this flaw in some publicly accessible Confluence instances, enabling them to craft unauthorized Confluence admini...

1 year ago

References

EPSS Score

96% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 💰

    Used in Ransomware

  • 🦅

    CISA Reported

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by Security Affairs

  • Vulnerability published

  • Vulnerability Reserved

Credit

an Atlassian customer
.