Security News > 2022 > June > Exploit released for Atlassian Confluence RCE bug, patch now
Proof-of-concept exploits for the actively exploited critical CVE-2022-26134 vulnerability impacting Atlassian Confluence and Data Center servers have been widely released this weekend.
The vulnerability tracked as CVE-2022-26134 is a critical unauthenticated, remote code execution vulnerability exploited through OGNL injection and impacts all Atlassian Confluence and Data Center 2016 servers after version 1.3.0.
On Friday, Atlassian released security updates to fix the vulnerability just as attacks escalated in the wild.
Friday afternoon, a proof-of-concept exploit for the Atlassian Confluence vulnerability was publicly posted.
The exploit soon spread widely online over the weekend, with researchers sharing examples on Twitter of how trivial it was to exploit.
If for some reason, you are unable to patch your servers immediately, Atlassian has provided mitigations for Confluence 7.0.0 through version 7.18.0.
News URL
Related news
- Exploit released for Fortinet RCE bug used in attacks, patch now (source)
- Exploit available for new critical TeamCity auth bypass bug, patch now (source)
- Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining (source)
- Microsoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugs (source)
- Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs (source)
- Exploit released for Palo Alto PAN-OS bug used in attacks, patch now (source)
- Maximum severity Flowmon bug has a public exploit, patch now (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-03 | CVE-2022-26134 | Expression Language Injection vulnerability in Atlassian Confluence Data Center In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. | 9.8 |