Atlassian CISO Announced: Improper Authorization Vulnerability Detected on Confluence Data Center and Server (CVE-2023-22518)

In a recent discovery, Confluence Data Center and Server customers found themselves vulnerable to significant data loss due to an Improper Authorization Vulnerability, tracked as CVE-2023-22518. Luckily the issue has been discovered by Confluence Team and announced by the company’s CISO in a note with the details that there is no active exploitation observed so far.

Message of CISO, Bala Sathiamurthy of AtlassianMessage of CISO, Bala Sathiamurthy of Atlassian

What You Need To Know About CVE-2023-22518?

This critical issue has the potential to cause considerable harm to targeted organizations, with unauthenticated attackers able to exploit this vulnerability. While there are currently no reports of active exploitation, the urgency to mitigate this vulnerability is high. Although severity of the issue is high, there is not much information shared by the company; the thing that can be inferred from CVSS vectoral string assigned by Confluence is that, even after a successful exploitation, the vulnerability affects only availability and integrity of the server on which vulnerable software is installed.

Details of the Vulnerability

Vulnerability card of CVE-2023-22518 from Vulnerability Intelligence Module of SOCRadarVulnerability card of CVE-2023-22518 from Vulnerability Intelligence Module of SOCRadar

Confluence, developed by Atlassian, is a widely used platform for team collaboration and information sharing, with a diverse user base spanning various industries. The vulnerability in question, CVE-2023-22518, was identified and an advisory was issued on October 30, 2023, by Atlassian’s Chief Information Security Officer (CISO), Bala Sathiamurthy. The related Jira ticket for this issue is CONFSERVER-93142. This vulnerability affects all versions of Confluence Data Center and Server, with Atlassian’s Cloud sites being unaffected.

Which Versions of Confluence Data Center and Server Are Affected by CVE-2023-22518?

Users of Confluence Data Center and Server are at risk of significant data loss if this vulnerability is exploited. Previous investigations into similar vulnerabilities show that such flaws can provide attackers with unauthorized access to networks and systems. While there is no impact on confidentiality and attackers cannot exfiltrate any instance data, the potential risks of unauthorized system access and other harm are present. Atlassian has issued official statements urging immediate action to protect affected instances.

All versions of Confluence Data Center and Server prior to the following fixed versions are affected:

  • 7.19.16 or later
  • 8.3.4 or later
  • 8.4.4 or later
  • 8.5.3 or later
  • 8.6.1 or later

Users are encouraged to apply these fixes as soon as possible and refer to the official advisory for patching instructions.

Is There a Proof-of-Concept (PoC) Exploit for CVE-2023-22518?

At this time, there is no mention of a publicly available Proof-of-Concept exploit. Users and administrators are advised to stay vigilant and monitor official Atlassian channels for any updates regarding exploit analyses.

There are currently no reports of this vulnerability being exploited in the wild or any attribution to specific threat actors.

As there are no reports of active exploitation, no additional incidents or data breaches have been reported as a result of this vulnerability.

What Should Users Do to Safeguard Their Confluence Data Center and Server?

Atlassian strongly advises patching affected installations to one of the fixed versions mentioned earlier. If patching is not immediately possible, temporary mitigations include backing up the instance and removing the instance from the internet until it can be patched. It is crucial for administrators to secure their systems and apply necessary updates to prevent exploitation.

How SOCRadar Can Help Securing System Against Vulnerabilities?

SOCRadar is a comprehensive cybersecurity solution that can greatly assist organizations in addressing recently discovered vulnerabilities through its Vulnerability Intelligence, Attack Surface Management, and Supply Chain Intelligence modules. 

SOCRadar Vulnerability Intelligence ModuleSOCRadar Vulnerability Intelligence Module

In the realm of Vulnerability Intelligence, SOCRadar keeps your organization informed and vigilant. It continuously monitors the evolving landscape of vulnerabilities and alerts you in real-time when critical vulnerabilities or exploits emerge for the specific product components and technologies associated with your digital footprint. This proactive approach allows you to stay one step ahead of threat actors and expedite the assessment and verification processes by providing actionable insights and contextual information.

SOCRadar’s CVE RadarSOCRadar’s CVE Radar

Access vulnerability trends and the SOCRadar Vulnerability Risk Score, which is calculated based on these trends using data collected from both the dark web and surface web. This valuable resource is readily available to you. Additionally, SOCRadar offers the CVE Radar service at no cost, aiding security professionals and system administrators in keeping abreast of the most recent vulnerabilities.

The post Atlassian CISO Announced: Improper Authorization Vulnerability Detected on Confluence Data Center and Server (CVE-2023-22518) appeared first on SOCRadar® Cyber Intelligence Inc..

Article Link: Atlassian CISO Announced: Improper Authorization Vulnerability Detected on Confluence Data Center and Server (CVE-2023-22518)