HTTP.URI.Java.Expression.Language.Code.Injection

description-logoDescription

This indicates an attack attempt to exploit a Code Injection Vulnerability through Java Expression Language in a HTTP URI.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application.

description-logoOutbreak Alert

A critical 0-day vulnerability on Atlassian Confluence Data Center and Server is actively being exploited in the wild. The vulnerability is established via the Object Graph Navigation Language (OGNL) injection that allows an unauthenticated user to execute arbitrary code.

View the full Outbreak Alert Report

View the full Outbreak Alert Report

FortiGuard Labs continues to observe attack attempts exploiting the vulnerabilities highlighted in the recent CISA advisory about Russian military cyber actors. These actors are targeting U.S. and global critical infrastructure to conduct espionage, steal data, and compromise or destroy sensitive information.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Atlassian Confluence versions prior to 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4, 7.18.1
VMware Spring Cloud Netflix from 2.2.0 to 2.2.10

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor
https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-04-16 27.769 Name:Atlassian.
Confluence.
OGNL.
Remote.
Code.
Execution:HTTP.
URI.
Java.
Expression.
Language.
Code.
Injection
2023-01-09 22.471 Sig Added
2022-06-06 21.333 Default_action:pass:drop
2022-06-04 21.331