CVE-2020-4027

Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.
References
Link Resource
https://jira.atlassian.com/browse/CONFSERVER-59898 Issue Tracking Patch Release Notes Vendor Advisory
https://jira.atlassian.com/browse/CONFSERVER-59898 Issue Tracking Patch Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:32

Type Values Removed Values Added
References () https://jira.atlassian.com/browse/CONFSERVER-59898 - Issue Tracking, Patch, Release Notes, Vendor Advisory () https://jira.atlassian.com/browse/CONFSERVER-59898 - Issue Tracking, Patch, Release Notes, Vendor Advisory

Information

Published : 2020-07-01 02:15

Updated : 2024-11-21 05:32


NVD link : CVE-2020-4027

Mitre link : CVE-2020-4027

CVE.ORG link : CVE-2020-4027


JSON object : View

Products Affected

atlassian

  • confluence
  • confluence_server
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')