Atlassian.Confluence.CVE-2021-26084.Remote.Code.Execution

description-logoDescription

This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in Atlassian Confluence.
The vulnerability is due to insufficient input validation while handling a malicious request. A remote attacker may be able to exploit this to execute arbitrary code via a crafted HTTP request.

description-logoOutbreak Alert

View the full Outbreak Alert Report

FortiGuard Labs continues to observe attack attempts exploiting the vulnerabilities highlighted in the recent CISA advisory about Russian military cyber actors. These actors are targeting U.S. and global critical infrastructure to conduct espionage, steal data, and compromise or destroy sensitive information.

View the full Outbreak Alert Report

affected-products-logoAffected Products

atlassian:confluence prior to 6.13.23
atlassian:confluence 6.14.0 to 7.4.11
atlassian:confluence 7.5.0 to 7.11.6
atlassian:confluence 7.12.0 to 7.12.5
atlassian:data_center prior to 6.13.23
atlassian:data_center 6.14.0 to 7.4.11
atlassian:data_center 7.5.0 to 7.11.6
atlassian:data_center 7.12.0 to 7.12.5

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor
https://jira.atlassian.com/browse/CONFSERVER-67940

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2022-06-21 21.342 Sig Added
2021-10-18 18.180 Sig Added
2021-10-06 18.171 Default_action:pass:drop
2021-09-29 18.167 Sig Added
2021-09-16 18.159 Sig Added
2021-09-08 18.154