CVE-2024-21683

Scores

EPSS

0.941high94.1%
0%20%40%60%80%100%

Percentile: 94.1%

CVSS

8.8high3.x
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 3.x
8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Description

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.

This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. 

Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html

You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.

This vulnerability was found internally.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-94

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-21683

Source: github-poc

URL: https://github.com/r3db34rdh4x/cve-2024-21683-rce

Vulnerable Software (8)

Type: Configuration

Vendor: *

Product: confluence_data_center

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:lts:*:*:*",      "versionEndExcluding": "7.19.24",      "versionStartIncluding": "7.19.0",      "vulne...

Source: nvd

Type: Configuration

Vendor: *

Product: confluence_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:lts:*:*:*",      "versionEndExcluding": "7.19.24",      "versionStartIncluding": "7.19.0",      "vulnerable...

Source: nvd

Type: Configuration

Vendor: *

Product: crucible

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*",      "versionEndExcluding": "4.8.15",      "versionStartIncluding": "4.8.0",      "vulnerable": true    }...

Source: nvd

Type: Configuration

Vendor: *

Product: fisheye

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*",      "versionEndExcluding": "4.8.15",      "versionStartIncluding": "4.8.0",      "vulnerable": true    }...

Source: nvd

Type: Configuration

Vendor: *

Product: jira_data_center

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:lts:*:*:*",      "versionEndExcluding": "9.4.21",      "versionStartIncluding": "9.4.0",      "vulnerable": ...

Source: nvd

Type: Configuration

Vendor: *

Product: jira_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:lts:*:*:*",      "versionEndExcluding": "9.4.21",      "versionStartIncluding": "9.4.0",      "vulnerable": true...

Source: nvd

Type: Configuration

Vendor: *

Product: jira_service_management

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*",      "versionEndExcluding": "5.4.21",      "versionStartIncluding": "5.4.0",     ...

Source: nvd

Type: Configuration

Vendor: *

Product: jira_service_management

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*",      "versionEndExcluding": "5.4.21",      "versionStartIncluding": "5.4.0",      "vul...

Source: nvd

End of list