Site icon TheCyberThrone

Atlassian Confluence fixes High Severity XSS Flaw – CVE-2024-21678

Advertisements

Atlassian has released a security update addressing CVE-2024-21678 with a CVSS score of 8.5, a high-severity stored cross-site scripting vulnerability impacting multiple Confluence Server and Data Center versions.

This flaw “allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, low impact to integrity, no impact to availability, and requires no user interaction.”

Advertisements

Successful exploitation of this XSS flaw requires attacker authentication but carries significant consequences:

CVE-2024-21678 first emerged in Confluence Data Center version 2.7.0. For users of Confluence Data Center, Atlassian advises updating to the most recent release. Should that prove infeasible, opt for an upgrade to one of the designated, officially supported versions.

Affected versionsFixed versions
from 8.7.0 to 8.7.18.8.0 recommended or 8.7.2
from 8.6.0 to 8.6.18.8.0 recommended
from 8.5.0 to 8.5.4 LTS8.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.4.0 to 8.4.58.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.3.0 to 8.3.48.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.2.0 to 8.2.38.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.1.0 to 8.1.48.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 8.0.0 to 8.0.48.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 7.20.0 to 7.20.38.8.0 recommended or 8.5.5 LTS or 8.5.6 LTS
from 7.19.0 to 7.19.17 LTS8.8.0 recommended or 8.5.6 LTS or 7.19.18 LTS or 7.19.19 LTS
from 7.18.0 to 7.18.38.8.0 recommended or 8.5.6 LTS or 7.19.19 LTS
from 7.17.0 to 7.17.58.8.0 recommended or 8.5.6 LTS or 7.19.19 LTS
Any earlier versions8.8.0 recommended or 8.5.6 LTS or 7.19.19 LTS
Advertisements

For Confluence Server clientele, the recommendation is to proceed with an update to the newest version within the 8.5.x LTS series. If this is not possible, selecting one of the officially endorsed versions for an upgrade is advisable.

Affected versionsFixed versions
from 8.5.0 to 8.5.4 LTS8.5.5 LTS or 8.5.6 LTS recommended
from 8.4.0 to 8.4.58.5.6 LTS recommended
from 8.3.0 to 8.3.48.5.6 LTS recommended
from 8.2.0 to 8.2.38.5.6 LTS recommended
from 8.1.0 to 8.1.48.5.6 LTS recommended
from 8.0.0 to 8.0.48.5.6 LTS recommended
from 7.20.0 to 7.20.38.5.6 LTS recommended
from 7.19.0 to 7.19.17 LTS8.5.6 LTS recommended or 7.19.18 LTS or 7.19.19 LTS
from 7.18.0 to 7.18.38.5.6 LTS recommended or 7.19.19 LTS
from 7.17.0 to 7.17.58.5.6 LTS recommended or 7.19.19 LTS
Any earlier versions8.5.6 LTS recommended or 7.19.19 LTS
Exit mobile version