VID |
210190 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
* References: http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector https://jira.atlassian.com/browse/CONFSERVER-57974 https://www.exploit-db.com/exploits/46731/
* Platforms Affected: Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x) Any operating system Any version |
Recommendation |
Upgrade to the latest version of Confluence Server (6.6.12/ 6/12.3/ 6.13.3/ 6.14.2 or later), available from the web site at https://www.atlassian.com/software/confluence/download |
Related URL |
CVE-2019-3396 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|