Confluence Server 漏洞列表
共找到 12 个与 Confluence Server 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2023-22518: Atlassian Confluence Server - Improper Authorization POC
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. Fofa: app="ATLASSIAN-Confluence" ZoomEye: app:"Atlassian Confluence" Censys: app:"Atlassian Confluence" Hunter: app.name="Confluence" -
CVE-2019-3396: Atlassian Confluence Server - Path Traversal POC
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection. -
CVE-2021-26084: Confluence Server - Remote Code Execution POC
Confluence Server and Data Center contain an OGNL injection vulnerability that could allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if 'Allow people to sign up to create their account' is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. -
CVE-2021-26085: Atlassian Confluence Server - Local File Inclusion POC
Atlassian Confluence Server allows remote attackers to view restricted resources via local file inclusion in the /s/ endpoint. -
CVE-2023-22518: Atlassian Confluence Server - Improper Authorization POC
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. -
CVE-2019-3396: Atlassian Confluence Server - Path Traversal POC
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection. -
CVE-2021-26084: Confluence Server - Remote Code Execution POC
Confluence Server and Data Center contain an OGNL injection vulnerability that could allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if 'Allow people to sign up to create their account' is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. -
CVE-2021-26085: Atlassian Confluence Server - Local File Inclusion POC
Atlassian Confluence Server allows remote attackers to view restricted resources via local file inclusion in the /s/ endpoint. -
CVE-2023-22518: Atlassian Confluence Server - Improper Authorization POC
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue. -
Atlassian Confluence Server 信息泄露漏洞 无POC
Atlassian Confluence Server存在信息泄露漏洞,该漏洞是由于应用程序/s/站点对用户输入的数据缺乏校验导致的。 -
Atlassian Confluence Server和Data Center远程代码执行漏洞 无POC
Atlassian Confluenc服务器和数据中心存在远程代码执行漏洞,此漏洞是由于软件未对输入进行过滤导致的。 -
Confluence Server硬编码漏洞(CVE-2022-26138) 无POC
当Confluence Server或Data Center上的Questions for Confluenceapp启用时,它会创建一个名为disabledsystemuser的Confluence用户帐户。