--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Access Control Vulnerability in Confluence Data Center and Server' version: '1.0' number: '2023-073' original_date: 'October 4, 2023' date: 'October 6, 2023' --- _History:_ * _6/10/2023 --- v1.0 -- Initial publication_ # Summary Atlassian has been made aware of a critical vulnerability, CVE-2023-22515, a Broken Access Control vulnerability in Confluence Data Center and Server. External attackers may exploit this vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorised Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are **not affected** by this vulnerability. # Technical Details External attackers can exploit a vulnerability in publicly accessible Confluence Data Center and Server instances. This allows them to create unauthorized Confluence administrator accounts and access the said instances. The vulnerability seems to impact the `/setup/*.action` and `/server-info.action` endpoints but no further technical details are provided yet. # Affected Products **Confluence Data Center and Server versions:** - 8.0.0 to 8.0.4 - 8.1.0 to 8.1.4 - 8.2.0 to 8.2.3 - 8.3.0 to 8.3.2 - 8.4.0 to 8.4.2 - 8.5.0 to 8.5.1 Note: Versions prior to 8.0.0 are **not affected**. # Detections Even after an updating Confluence to a fixed version, ensure you check all affected Confluence instances for: 1. Unexpected members of the `confluence-administrators` group. 2. Newly created user accounts that were not expected. 3. Requests to `/setup/*.action` in network access logs. 4. Presence of `/setup/setupadministrator.action` in an exception message in the Confluence home directory (`atlassian-confluence-security.log`) 5. Presence of `/server-info.action` in network access logs, as mentionned by Rapid7 [2]. # Recommendations It is recommended to upgrade to one of the following fixed versions (or any later version): - 8.3.3 or later - 8.4.3 or later - 8.5.2 (Long Term Support release) or later If upgrading is not immediately possible, you should: 1. Restrict external network access to the affected instance. 2. Block access to the `/setup/*` endpoints. This can be done at the network layer or by modifying configuration files as described: - On each node, modify `//confluence/WEB-INF/web.xml` to include: ```xml /setup/* * ``` - Restart Confluence. # References [1] [2]