CVE-2019-3398

Scores

EPSS

0.942High
94.2%
0%20%40%60%80%100%

Percentile: 94.2%

CVSS

8.8High
3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
9.0

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Description

Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has ‘Admin’ permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-22

Related Vulnerabilities

Exploits

Exploit ID: CVE-2019-3398

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 47621

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47621

Vulnerable Software (2)

Type: Configuration

Vendor: atlassian

Product: confluence

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.6.13",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
   ...

Source: nvd

Type: Configuration

Vendor: atlassian

Product: confluence_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.6.13",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
   ...

Source: nvd