HTTP.URI.Java.Expression.Language.Code.Injection
Description
This indicates an attack attempt to exploit a Code Injection Vulnerability through Java Expression Language in a HTTP URI.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application.
Outbreak Alert
A critical 0-day vulnerability on Atlassian Confluence Data Center and Server is actively being exploited in the wild. The vulnerability is established via the Object Graph Navigation Language (OGNL) injection that allows an unauthenticated user to execute arbitrary code.
View the full Outbreak Alert Report
View the full Outbreak Alert Report
FortiGuard Labs continues to observe attack attempts exploiting the vulnerabilities highlighted in the recent CISA advisory about Russian military cyber actors. These actors are targeting U.S. and global critical infrastructure to conduct espionage, steal data, and compromise or destroy sensitive information.
Affected Products
Atlassian Confluence versions prior to 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4, 7.18.1
VMware Spring Cloud Netflix from 2.2.0 to 2.2.10
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor
https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2024-04-16 | 27.769 | Name:Atlassian. Confluence. OGNL. Remote. Code. Execution:HTTP. URI. Java. Expression. Language. Code. Injection |
2023-01-09 | 22.471 | Sig Added |
2022-06-06 | 21.333 | Default_action:pass:drop |
2022-06-04 | 21.331 |