CVE-2020-29448 vulnerability in Atlassian Products
Published on February 22, 2021
The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
Products Associated with CVE-2020-29448
stack.watch emails you whenever new vulnerabilities are published in Atlassian Confluence or Atlassian Data Center. Just hit a watch button to start following.
Affected Versions
Atlassian Confluence Server:- Version unspecified and below 6.13.18 is affected.
- Version 6.14.0 and below unspecified is affected.
- Version unspecified and below 7.4.6 is affected.
- Version 7.5.0 and below unspecified is affected.
- Version unspecified and below 7.8.3 is affected.
- Version unspecified and below 6.13.18 is affected.
- Version 6.14.0 and below unspecified is affected.
- Version unspecified and below 7.4.6 is affected.
- Version 7.5.0 and below unspecified is affected.
- Version unspecified and below 7.8.3 is affected.
Exploit Probability
EPSS
0.63%
Percentile
69.82%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.