9.8

CVE-2021-26084

Warnung
Exploit
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AtlassianConfluence Data Center Version < 6.13.23
AtlassianConfluence Data Center Version >= 6.14.0 < 7.4.11
AtlassianConfluence Data Center Version >= 7.5.0 < 7.11.6
AtlassianConfluence Data Center Version >= 7.12.0 < 7.12.5
AtlassianConfluence Server Version < 6.13.23
AtlassianConfluence Server Version >= 6.14.0 < 7.4.11
AtlassianConfluence Server Version >= 7.5.0 < 7.11.6
AtlassianConfluence Server Version >= 7.12.0 < 7.12.5

03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog

Atlassian Confluence Server and Data Center Object-Graph Navigation Language (OGNL) Injection Vulnerability

Schwachstelle

Atlassian Confluence Server and Data Server contain an Object-Graph Navigation Language (OGNL) injection vulnerability that may allow an unauthenticated attacker to execute code.

Beschreibung

Apply updates per vendor instructions.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.44% 1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.