Security

Mitigation Instructions for CVE-2023-22527

Written by CyRisk Vulnerability Management Team | Feb 23, 2024 10:03:31 PM

SUBJECT: Critical RCE Vulnerability in Atlassian Confluence Data Center and Server (CVE-2023-22527)

TECH STACK: Atlassian Confluence Data Center and Server

DATE(S) ISSUED: 01/16/2024

NVD Last Modified: 01/26/2024

CRITICALITY: CRITICAL (CVSS Score: 9.8 NIST, 10.0 Atlassian)

OVERVIEW: 

A critical remote code execution (RCE) vulnerability exists in older versions of Atlassian Confluence Data Center and Server due to a template injection flaw. 

This vulnerability allows unauthenticated attackers to execute arbitrary code on a vulnerable Confluence instance, potentially leading to complete system compromise.

SOLUTION: 

Immediate Action:

Upgrade to the latest version of Confluence Data Center or Server: Atlassian has released patched versions that address this vulnerability. You can find the download links and upgrade instructions on the Atlassian website:

  1. Confluence Data Center: https://www.atlassian.com/software/confluence/features/whats-new
  2. Confluence Server:
    https://www.atlassian.com/software/confluence/download-journey

Additional Mitigations:

If upgrading immediately is not possible, consider implementing the following temporary mitigations:

  1. Restrict access to the Confluence instance to authorized users only.
  2. Monitor your Confluence instance for any suspicious activity.

REFERENCES:

Third-Party Advisories:

  1. Atlassian Security Advisory
  2. NVD Entry
  3. Packet Storm Security Analysis

Confirmation & Additional Information:

  1. This vulnerability is actively exploited by attackers. Take immediate action to upgrade or implement the recommended mitigations to protect your Confluence instance. 

Cross-References:

  1. CISA Known Exploited Vulnerabilities Catalog