RULE(RULE ID:337867)

Rule General Information
Release Date: 2024-03-26
Rule Name: Atlassian Confluence Arbitrary Command Execution Vulnerability (CVE-2023-22527)
Severity:
CVE ID:
Rule Protection Details
Description: A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian’s January Security Bulletin.
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: https://jira.atlassian.com/browse/CONFSERVER-93833
https://confluence.atlassian.com/pages/viewpage.action
https://cxsecurity.com/cveshow/CVE-2023-22527/
https://cxsecurity.com/issue/WLB-2024010077
Solutions
Refer to the announcement or patch by the vendor: https://confluence.atlassian.com/pages/viewpage.action