Unauth Admin Impersonation in Atlassian Confluence DC/Server (CVE-2023-22518)
CVE-2023-22518 Published on October 31, 2023

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

NVD

Known Exploited Vulnerability

This Atlassian Confluence Data Center and Server Improper Authorization Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data.

The following remediation steps are recommended / required by November 28, 2023: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weakness Type

What is an AuthZ Vulnerability?

The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

CVE-2023-22518 has been classified to as an AuthZ vulnerability or weakness.


Products Associated with CVE-2023-22518

Want to know whenever a new CVE is published for Atlassian Confluence? stack.watch will email you.

 

Affected Versions

Atlassian Confluence Data Center: Atlassian Confluence Server:

Exploit Probability

EPSS
94.38%
Percentile
99.96%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.