Vulnerability Watch

Forum Discussion

snarang's avatar
snarang
Product Team
4 years ago

In-the-Wild Exploitation of Atlassian Confluence OGNL...

In-the-Wild Exploitation of Atlassian Confluence OGNL Injection Vulnerability (CVE-2021-26084)

On August 25, Atlassian published a security advisory for a critical vulnerability in its Confluence Server and Data Center solutions. Identified as CVE-2021-26084, the flaw resides in Confluence’s implementation of Webwork. It was assigned a CVSSv3 score of 9.8.

Initially, it was believed that the requirements for exploitation would create hurdles for attackers. However, within a week of its disclosure, in-the-wild exploitation attempts were detected, leading to a revision of the advisory and confirmation that an unauthenticated attacker could easily exploit this flaw. We strongly believe organizations should apply these patches immediately.

For more information about the vulnerability, including the availability of patches and Tenable product coverage, please visit our blog.

3 Replies

  • Here is templating error in your link to tenable blog:

    https://tenable_blog_url/?utm_source=cyber_exposure_alerts_community_title&utm_medium=community&utm_campaign=tenable_community

    • snarang's avatar
      snarang
      Product Team

      Thanks for catching that, @VOLODYMYR HETMANSHCHUK​ I've updated the link.

  • btw. There are a lot of templating error in your newsletters, especially in subject.. Like [subject_line], see attachment