CVE-2019-3394

Scores

EPSS

0.764medium76.4%
0%20%40%60%80%100%

Percentile: 76.4%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
4.0

Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Description

There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under /confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-22

Exploits

Exploit ID: CVE-2019-3394

Source: github-poc

URL: https://github.com/jas502n/CVE-2019-3394

Vulnerable Software (2)

Type: Configuration

Vendor: atlassian

Product: confluence

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",      "versionEndExcluding": "6.6.16",      "versionStartIncluding": "6.1.0",      "vulnerable": true   ...

Source: nvd

Type: Configuration

Vendor: atlassian

Product: confluence_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",      "versionEndExcluding": "6.6.16",      "versionStartIncluding": "6.1.0",      "vulnerable": true   ...

Source: nvd