RULE(RULE ID:333896)

Rule General Information
Release Date: 2021-09-04
Rule Name: Atlassian Confluence Server Remote Code Execution Vulnerability (CVE-2021-26084)
Severity:
CVE ID:
Rule Protection Details
Description: In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance. The vulnerable endpoints can be accessed by a non-administrator user or unauthenticated user if ‘Allow people to sign up to create their account’ is enabled. To check whether this is enabled go to COG > User Management > User Signup Options. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: http://packetstormsecurity.com/files/164013/Confluence-Server-7.12.4-OGNL-Injection-Remote-Code-Execution.html
https://jira.atlassian.com/browse/CONFSERVER-67940
Solutions
The vendor has released upgrade patches to fix vulnerabilities, please visit:
https://support.atlassian.com/confluence-server/