9.8
CVE-2022-26138
- EPSS 94.27%
- Veröffentlicht 20.07.2022 18:15:08
- Zuletzt bearbeitet 24.10.2025 13:38:23
- Quelle security@atlassian.com
- CVE-Watchlists
- Unerledigt
The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Atlassian ≫ Questions For Confluence Version2.7.34
Atlassian ≫ Questions For Confluence Version2.7.35
Atlassian ≫ Questions For Confluence Version3.0.2
29.07.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability
SchwachstelleAtlassian Questions For Confluence App has hard-coded credentials, exposing the username and password in plaintext. A remote unauthenticated attacker can use these credentials to log into Confluence and access all content accessible to users in the confluence-users group.
BeschreibungApply updates per vendor instructions.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 94.27% | 0.999 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.