Atlassian Issues Second Warning on Potential Exploitation of Critical Confluence Flaw 


Enterprise software maker Atlassian on Thursday issued a fresh warning on the potential exploitation of a recent critical-severity vulnerability in Confluence Data Center and Confluence Server.

Tracked as CVE-2023-22518 (CVSS score of 9.1), the flaw is described as an improper authorization issue that could lead to severe data loss. All versions of the collaboration solution are affected.

Atlassian has released patches for the bug and the company’s CISO, Bala Sathiamurthy, on Monday urged organizations to apply the fixes as soon as possible, citing the severity of the bug.

“As part of our continuous security assessment processes, we have discovered that Confluence Data Center and Server customers are vulnerable to significant data loss if exploited by an unauthenticated attacker,” Sathiamurthy said.

On Thursday, the software maker updated its advisory to underline a heightened risk of exploitation following the public release of technical information on CVE-2023-22518 and potential exploitation vectors.

“As part of Atlassian’s ongoing monitoring of this CVE, we observed publicly posted critical information about the vulnerability which increases risk of exploitation,” the company said.

The fresh warning came on the same day as ProjectDiscovery published an analysis of the changes Atlassian made to address the flaw, which led them to identifying a method handler that lacks sufficient checks, allowing for authentication bypass if the correct parameters are supplied in a request.

ProjectDiscovery also released a detection-based template targeting the vulnerability and the timing of publication suggests that Atlassian was referring to this exploit code in their updated advisory.

Advertisement. Scroll to continue reading.

While there appears to be no evidence of in-the-wild exploitation of CVE-2023-22518, the critical severity of the bug demands quick action, the software vendor underlined.

“There are still no reports of an active exploit, though customers must take immediate action to protect their instances. If you already applied the patch, no further action is required,” Atlassian noted.

Confluence Data Center and Server versions 7.19.16, 8.3.4, 8.4.4, 8.5.3, and 8.6.1 contain the necessary fixes for this bug.

Related: Mass Exploitation of ‘Citrix Bleed’ Vulnerability Underway

Related: Attackers Exploiting Critical F5 BIG-IP Vulnerability

Related: Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data



Source link