Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/CONFSERVER-68844 | Issue Tracking Third Party Advisory |
https://jira.atlassian.com/browse/CONFSERVER-68844 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.atlassian.com/browse/CONFSERVER-68844 - Issue Tracking, Third Party Advisory |
Information
Published : 2022-04-05 04:15
Updated : 2024-11-21 06:18
NVD link : CVE-2021-39114
Mitre link : CVE-2021-39114
CVE.ORG link : CVE-2021-39114
JSON object : View
Products Affected
atlassian
- confluence_data_center
- confluence_server
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')