Atlassian warns of critical Confluence flaw

Atlassian has warned users of its Confluence Server that they need to patch the product to remedy a Critical-rated flaw.

The company’s not saying a lot about CVE-2021-26084, besides describing it as a “Confluence Server Webwork OGNL injection vulnerability … that would allow an authenticated user, and in some instances unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance.”

The bug scores 9.8 on the ten-point Common Vulnerability Scoring System.

Atlassian has released fixed versions of the product – namely versions 6.13.23, 7.4.11, 7.11.6, 7.12.5, and 7.13.0 – but the company’s advisory suggests upgrading to the latest long-term service release.

That means version 7.13, which was released last week – nine days before disclosure of this flaw.

Atlassian’s advisory notes that a full upgrade is not possible for all users, so they need to step up to the clean double-point versions mentioned above before contemplating the step to version 7.13.

Cloud-hosted Confluence is not impacted by the bug.

Atlassian’s documentation for the bug is not very detailed. It almost certainly refers to the Object-Graph Navigation Language (OGNL), a project that offers an expression language for getting and setting properties of Java objects. Atlassian hasn’t mentioned whether the flaw has its roots in open-source code, or its own efforts. The Register cannot find a reference to the flaw beyond the Australian company’s advisory and documents.

The flaw was discovered by Benny Jacob (SnowyOwl) through the Atlassian public bug bounty program. ®

READ MORE HERE