iTnews Asia
  • Home
  • News
  • Security

Critical vulnerability found in Atlassian Confluence software

Critical vulnerability found in Atlassian Confluence software

Drop everything and patch, company warns.

By Richard Chirgwin on Nov 1, 2023 12:16PM

Atlassian has issued an out-of-cycle warning that all versions of its Confluence Data Centre and Confluence Server software are vulnerable to an improper authorisation vulnerability.

The company’s advisory for CVE-2023-22518 attributed a message to the company’s CISO, Bala Sathiamurthy, saying the users are “vulnerable to significant data loss” if the vulnerability is exploited.

“There are no reports of active exploitation at this time; however, customers must take immediate action to protect their instances,” Sathiamurthy wrote.

He continued that Atlassian would deliver patches “outside of our monthly advisory schedule”.

The advisory stated that “all versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data.”

The bug doesn’t affect Atlassian Cloud sites (that is, those accessed through an atlassian.net domain).

The bug rates 9.1 on the Common Vulnerability Scoring System.

While Atlassian’s description of the vulnerability is light on detail, the discussion in the bug’s Jira ticket gives some hints.

Apparently, the bug results in leakage of file descriptors.

One user, Mavenir’s Martin Palecek, commented: “In our case it is not attachments that leak file descriptors. It's user avatars and nothing else than user avatars in our case. 

“The rate of leakage seems somewhat proportional to the rates of the requests the server is handling.”

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
atlassian confluence security

Related Articles

  • Best practice tips for secure password management
  • Are third-party blind spots the weakest link in enterprise cybersecurity chain?
  • Five tips a CIO or CSO should know to stop employee-driven IP theft
  • StarHub launches app to protect customers from scam calls and SMS
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Indonesia's national data centre suffers ransomware attack

Indonesia's national data centre suffers ransomware attack

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Best practice tips for secure password management

Best practice tips for secure password management

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.