Atlassian Confluence fixes High Severity XSS Flaw – CVE-2024-21678

Atlassian Confluence fixes High Severity XSS Flaw – CVE-2024-21678


Atlassian has released a security update addressing CVE-2024-21678 with a CVSS score of 8.5, a high-severity stored cross-site scripting vulnerability impacting multiple Confluence Server and Data Center versions.

This flaw “allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, low impact to integrity, no impact to availability, and requires no user interaction.”

Advertisements

Successful exploitation of this XSS flaw requires attacker authentication but carries significant consequences:

  • Session Hijacking: Attackers could steal authentication credentials and session tokens, allowing them to escalate privileges and gain unauthorized access to sensitive Confluence data.
  • Data Integrity Compromise: Malicious content can be injected, potentially defacing the Confluence instance, misdirecting users, and damaging trust in the platform.
  • Lateral Movement: An XSS foothold can act as a springboard for further attacks within the organization’s network, potentially leading to data exfiltration or ransomware deployment.

CVE-2024-21678 first emerged in Confluence Data Center version 2.7.0. For users of Confluence Data Center, Atlassian advises updating to the most recent release. Should that prove infeasible, opt for an upgrade to one of the designated, officially supported versions.

Affected versionsFixed versions
from 8.7.0 to 8.7.18.8.0 recommended or 8.7.2
from 8.6.0 to 8.6.18.8.0 recommended
from 8.5.0 to 8.5.4 LTS8.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.4.0 to 8.4.58.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.3.0 to 8.3.48.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.2.0 to 8.2.38.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.1.0 to 8.1.48.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.0.0 to 8.0.48.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 7.20.0 to 7.20.38.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 7.19.0 to 7.19.17 LTS8.8.0 recommended or 8.5.6 LTS or 7.19.18 LTS or 7.19.19 LTS
from 7.18.0 to 7.18.38.8.0 recommended or 8.5.6 LTS or 7.19.19 LTS
from 7.17.0 to 7.17.58.8.0 recommended or 8.5.6 LTS or 7.19.19 LTS
Any earlier versions8.8.0 recommended or 8.5.6 LTS or 7.19.19 LTS
Advertisements

For Confluence Server clientele, the recommendation is to proceed with an update to the newest version within the 8.5.x LTS series. If this is not possible, selecting one of the officially endorsed versions for an upgrade is advisable.

Affected versionsFixed versions
from 8.5.0 to 8.5.4 LTS8.5.5 LTS or 8.5.6 LTS recommended
from 8.4.0 to 8.4.58.5.6 LTS recommended
from 8.3.0 to 8.3.48.5.6 LTS recommended
from 8.2.0 to 8.2.38.5.6 LTS recommended
from 8.1.0 to 8.1.48.5.6 LTS recommended
from 8.0.0 to 8.0.48.5.6 LTS recommended
from 7.20.0 to 7.20.38.5.6 LTS recommended
from 7.19.0 to 7.19.17 LTS8.5.6 LTS recommended or 7.19.18 LTS or 7.19.19 LTS
from 7.18.0 to 7.18.38.5.6 LTS recommended or 7.19.19 LTS
from 7.17.0 to 7.17.58.5.6 LTS recommended or 7.19.19 LTS
Any earlier versions8.5.6 LTS recommended or 7.19.19 LTS

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.