Article Details

Scrape Timestamp (UTC): 2023-10-05 03:32:43.261

Source: https://thehackernews.com/2023/10/atlassian-confluence-hit-by-newly.html

Original Article Text

Click to Toggle View

Atlassian Confluence Hit by Newly Actively Exploited Zero-Day – Patch Now. Atlassian has released fixes to contain an actively exploited critical zero-day flaw impacting publicly accessible Confluence Data Center and Server instances. The vulnerability, tracked as CVE-2023-22515, is remotely exploitable and allows external attackers to create unauthorized Confluence administrator accounts and access Confluence servers. It does not impact Confluence versions prior to 8.0.0. Confluence sites accessed via an atlassian.net domain are also not vulnerable to this issue. The enterprise software services provider said it was made aware of the issue by "a handful of customers." It has been addressed in the following versions of Confluence Data Center and Server - The company, however, did not disclose any further specifics about the nature and scale of the exploitation, or the root cause of the vulnerability. Customers who are unable to apply the updates are advised to restrict external network access to the affected instances. "Additionally, you can mitigate known attack vectors for this vulnerability by blocking access to the /setup/* endpoints on Confluence instances," Atlassian said. "This is possible at the network layer or by making the following changes to Confluence configuration files." The company has also provided the following indicators of compromise (IoCs) to determine if an on-premise instance has been potentially breached - "If it is determined that your Confluence Server/DC instance has been compromised, our advice is to immediately shut down and disconnect the server from the network/Internet," Atlassian said. "Also, you may want to immediately shut down any other systems which potentially share a user base or have common username/password combinations with the compromised system." "It's unusual, though not unprecedented, for a privilege escalation vulnerability to carry a critical severity rating," Rapid7's Caitlin Condon said, adding the flaw is "typically more consistent with an authentication bypass or remote code execution chain than a privilege escalation issue by itself." With flaws in Atlassian Confluence instances widely exploited by threat actors in the past, it's recommended that customers update to a fixed version immediately, or implement appropriate mitigations.

Daily Brief Summary

CYBERCRIME // Critical Zero-Day Vulnerability Actively Exploited in Atlassian Confluence; Patch Released

Software company Atlassian has patched an actively exploited zero-day vulnerability (CVE-2023-22515) affecting publicly accessible instances of Confluence Data Center and Server.

The flaw, given a critical severity rating, enables remote attackers to create unauthorized administrator accounts and gain access to Confluence servers. It does not affect Confluence versions earlier than 8.0.0 or sites accessed via an atlassian.net domain.

Atlassian learned of the issue from a "handful of customers" and has addressed it in certain versions of Confluence Data Center and Server. However, no specific details about the exploitation or the vulnerability's root cause have been disclosed.

Customers who cannot apply the updates are advised to limit external network access to the impacted instances, and to block access to the /setup/* endpoints on Confluence instances.

The company has suggested Indicators of Compromise (IoCs) to help customers determine if their instances have been potentially breached and provided advice on action to take if a breach is confirmed. It has also encouraged immediate updates to a fixed version or proper mitigations implementation.