Atlassian warns of public vulnerability details for a critical flaw in Confluence Data Center and Server, as its CISO urges organizations to apply patches immediately
Update November 7:The Background and Analysis section has been updated to reflect that Atlassian has increased the CVSS score for CVE-2023-22518.
On October 31, Atlassian published an advisory for a critical vulnerability in Confluence Data Center and Server, a popular web-based wiki.
CVE | Description | CVSSv3 | VPR* |
---|---|---|---|
CVE-2023-22518 | Atlassian Confluence Data Center and Server Improper Authorization Vulnerability | 10 | 8.8 |
*Please note: Tenable’s Vulnerability Priority Rating (VPR) scores are calculated nightly. This blog post was updated on November 7 and reflects VPR at that time.
According to its advisory, Atlassian says that all versions of Confluence Data Center and Confluence Server are affected by this vulnerability.
CVE-2023-22518 is an improper authorization vulnerability in the setup-restore endpoints of Atlassian Confluence Data Center and Server. An attacker could exploit this vulnerability by sending specially crafted requests with the required parameters to the vulnerable endpoints on a Confluence Data Center or Server instance. According to Atlassian’s advisory, successful exploitation of this flaw could result in “significant data loss.” An FAQ blog post from Atlassian notes that successful exploitation would reset an instance’s content, thereby requiring a restore from a backup as the only way to recover the lost data.
Atlassian CISO issues warning to customers
In an unprecedented move, Atlassian’s advisory includes a statement from its chief information security officer (CISO), Bala Sathiamurthy, who specifically called out that “significant data loss” could occur if exploited by “an unauthenticated attacker.” In his note, Sathiamurthy underscored that customers “must take immediate action to protect their instances.”
Publicly available vulnerability details increases risk of potential exploitation
On November 2, Atlassian updated its advisory with an observation that “publicly posted critical information about the vulnerability” had become available, which “increases risk of exploitation.” The information observed includes write-ups about the vulnerability by security researchers, which could be used to develop a working proof-of-concept exploit. The advisory also points out that publicly accessible instances are at the most risk.
Second critical flaw in Atlassian Confluence in the last month
This is the second critical vulnerability disclosed in Atlassian Confluence Data Center and Server in the last month. In October, Atlassian patched CVE-2023-22515, another critical flaw in Confluence Data Center and Server, that was exploited in the wild as a zero-day.
Because Confluence Data Center and Server is often an internet-facing asset, it has become a popular target for cybercriminals over the last few years. As of November 3, no in-the-wild exploitation has been observed for CVE-2023-22518. However, with vulnerability details now public, we anticipate in-the-wild attacks to begin soon.
Widespread exploitation of CVE-2023-22518 has begun
On November 5, our partners at GreyNoise confirmed that "widespread exploitation" of CVE-2023-22518 had begun.
Widespread exploitation of the CVE-2023-22518 authentication bypass vulnerability in Atlassian Confluence Server has begun, posing a risk of significant data loss. #threatintelhttps://t.co/UdKHdTKSJW pic.twitter.com/imEQUQnD4K
— Glenn 📎 (@NTKramer) November 5, 2023
On November 6, researchers at The DFIR Report posted that CVE-2023-22518 is being exploited to distribute the C3RB3R ransomware.
— The DFIR Report (@TheDFIRReport) November 6, 2023
CVSS score for CVE-2023-22518 increased to the highest rating
On November 6, Atlassian updated their security advisory to note that the CVSSv3 score for CVE-2023-22518 has increased from 9.1 to 10, the highest possible rating on the CVSS scale. Atlaissian cites that active exploitation by ransomware groups has resulted in a change in scope for this vulnerability.
On November 2, write-ups about and exploitation demonstrations of CVE-2023-22518 were published on social media and blog posts. The information contained within these write-ups provide enough information for an attacker to potentially develop their own working proof-of-concept exploit.
— Henry Chen (@chybeta) November 2, 2023
Atlassian have released the following fixed versions of Confluence Data Center and Server to address this vulnerability:
Affected Versions | Fixed Version |
---|---|
7.19.15 and below | 7.19.16 and above |
8.3.3 and below | 8.3.4 and above |
8.4.3 and below | 8.4.4 and above |
8.5.2 and below | 8.5.3 and above |
8.6.0 and below | 8.6.1 and above |
If patching is not feasible at this time, Atlassian recommends backing up the Confluence instance and applying the following temporary mitigations until patches can be applied:
For more information about the specific temporary mitigations, please refer to the relevant section in the Atlassian advisory.
A list of Tenable plugins to identify this vulnerability can be located on the individual CVE page for CVE-2023-22518. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.
Update November 7:The Background and Analysis section has been updated to reflect that Atlassian has increased the CVSS score for CVE-2023-22518.
Update November 6:The Analysis section has been updated to reflect that exploitation of CVE-2023-22518 has been observed in the wild, including use by a ransomware group.
Join Tenable's Security Response Team on the Tenable Community.
Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.
Satnam joined Tenable in 2018. He has over 15 years experience in the industry (M86 Security and Symantec). He contributed to the Anti-Phishing Working Group, helped develop a Social Networking Guide for the National Cyber Security Alliance, uncovered a huge spam botnet on Twitter and was the first to report on spam bots on Tinder. He's appeared on NBC Nightly News, Entertainment Tonight, Bloomberg West, and the Why Oh Why podcast.
Interests outside of work: Satnam writes poetry and makes hip-hop music. He enjoys live music, spending time with his three nieces, football and basketball, Bollywood movies and music and Grogu (Baby Yoda).
Enter your email and never miss timely alerts and security guidance from the experts at Tenable.
Formerly Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Formerly Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
100 assets
Choose Your Subscription Option:
Thank you for your interest in Tenable.io. A representative will be in touch soon.
FREE FOR 7 DAYS
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro Trial.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
BUY
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
100 assets
Choose Your Subscription Option:
Thank you for your interest in Tenable.io. A representative will be in touch soon.
Formerly Tenable.io Web Application Scanning
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Formerly Tenable.io Web Application Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Formerly Tenable.sc
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Formerly Tenable.ot
Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.
Formerly Tenable.ad
Continuously detect and respond to Active Directory attacks. No agents. No privileges.
On-prem and in the cloud.
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
Exposure management for the modern attack surface.
Formerly Tenable.asm
Know the exposure of every asset on any platform.
Thank you for your interest in Tenable Attack Surface Management. A representative will be in touch soon.
FREE FOR 7 DAYS
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
FREE FOR 7 DAYS
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Already have Nessus Professional?
Upgrade to Nessus Expert free for 7 days.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.