Image source: Shutterstock
Customers vulnerable to “significant data loss” if attackers exploit CVE-2023-22518, company CISO warns.
Atlassian wants customers of its Confluence Data Center and Server to immediately upgrade to new versions of the software the company has just released to protect against a critical vulnerability in the collaboration platform.
All versions affected: The vulnerability tracked as CVE-2023-22518 affects ALL versions of Confluence Data enter and Server and gives attackers a way to steal data. The vulnerability does NOT impact customers of Atlassian’s cloud hosted services.
Easily exploitable: Atlassian had assigned the vulnerability a severity score of 9. 1 out of a maximum possible 10 on the CVSS scale. Based on its internal assessment of the flaw the company has concluded that the vulnerability is remotely exploitable, involves low attack complexity and requires no special user privileges or user interaction to exploit.
Significant data loss threat: “We have discovered that Confluence Data Center and Server customers are vulnerable to significant data loss if exploited by an unauthenticated attacker,” Atlassian CISO Bala Sathiamurthy said in a statement that accompanied the company’s vulnerability disclosure October 30. So far, Atlassian has observed no signs of attackers actively exploiting the flaw. “However, customers must take immediate action to protect their instances,” Sathiamurthy said.
Update now: The company wants customers to immediately update to one of the following fixes versions of the software. 7.19.16 or later; 8.3.4 or later; 8.4.4 or later; 8.5.3 or later. Atlassian wants customers that cannot immediately patch to back up their systems and remove their instances from the Internet until they can path. The advice applies even to Internet accessible Atlassian instances that require user authentication.
Atlassian has not disclosed how it discovered the bug. But as background, the company has pretty robust practices in place—including a bug bounty program—to try and identify bugs in its products. Between July 2023 and Sept 2023, some 196 individual security researchers participated in Atlassian’s bug bounty program. They reported a total of 375 bugs for review to the company of which 131 turned out to be valid bugs.