Forum Discussion
In-the-Wild Exploitation of Atlassian Confluence OGNL...
In-the-Wild Exploitation of Atlassian Confluence OGNL Injection Vulnerability (CVE-2021-26084)
On August 25, Atlassian published a security advisory for a critical vulnerability in its Confluence Server and Data Center solutions. Identified as CVE-2021-26084, the flaw resides in Confluence’s implementation of Webwork. It was assigned a CVSSv3 score of 9.8.
Initially, it was believed that the requirements for exploitation would create hurdles for attackers. However, within a week of its disclosure, in-the-wild exploitation attempts were detected, leading to a revision of the advisory and confirmation that an unauthenticated attacker could easily exploit this flaw. We strongly believe organizations should apply these patches immediately.
For more information about the vulnerability, including the availability of patches and Tenable product coverage, please visit our blog.
3 Replies
Here is templating error in your link to tenable blog:
https://tenable_blog_url/?utm_source=cyber_exposure_alerts_community_title&utm_medium=community&utm_campaign=tenable_community
- snarangProduct Team
Thanks for catching that, @VOLODYMYR HETMANSHCHUK I've updated the link.