securityonline.info Open in urlscan Pro
2a05:d014:776:a63e:931e:6ac2:944b:f27e  Public Scan

URL: https://securityonline.info/cve-2024-21683-atlassian-patches-rce-flaw-in-confluence-data-center-and-server/
Submission: On May 22 via api from IN — Scanned from DE

Form analysis 2 forms found in the DOM

https://securityonline.info/

<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" name="s"></label>
  <input type="submit" class="search-submit" value="Search">
</form>

https://securityonline.info/

<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" name="s"></label>
  <input type="submit" class="search-submit" value="Search">
</form>

Text Content

Skip to content

Penetration Testing


 * Search for:

 * Home
 * Cyber Security
 * Data Leak
 * Forensics
 * Malware Analysis
 * Malware Attack
 * Network PenTest
   * Information Gathering
   * Vulnerability Analysis
   * Exploitation
     * Metasploit
   * Post Exploitation
   * Maintaining Access
   * Password Attacks
   * Sniffing & Spoofing
   * Smartphone PenTest
   * Wireless
 * Reverse Engineering
 * Vulnerability
 * Web PenTest
   * Web Information Gathering
   * Web Vulnerability Analysis
   * Web Exploitation
   * Web Maintaining Access
   * Reporting

 * Home
 * Cyber Security
 * Data Leak
 * Forensics
 * Malware Analysis
 * Malware Attack
 * Network PenTest
   * Information Gathering
   * Vulnerability Analysis
   * Exploitation
     * Metasploit
   * Post Exploitation
   * Maintaining Access
   * Password Attacks
   * Sniffing & Spoofing
   * Smartphone PenTest
   * Wireless
 * Reverse Engineering
 * Vulnerability
 * Web PenTest
   * Web Information Gathering
   * Web Vulnerability Analysis
   * Web Exploitation
   * Web Maintaining Access
   * Reporting

Search for:

Penetration Testing


 * Vulnerability


CVE-2024-21683: ATLASSIAN PATCHES RCE FLAW IN CONFLUENCE DATA CENTER AND SERVER

by do son · May 21, 2024



Atlassian, a leading provider of collaboration and productivity software, has
urgently addressed a remote code execution (RCE) vulnerability in its Confluence
Data Center and Server products. Tracked as CVE-2024-21683, this flaw could
allow authenticated attackers to seize control of affected systems, potentially
leading to data breaches and operational disruptions.



The vulnerability, introduced in Confluence version 5.2, carries a CVSS score of
8.3, highlighting its severity. It could be exploited without any user
interaction, making it particularly dangerous. Successful exploitation would
grant attackers the ability to execute arbitrary code with high-level
privileges, effectively compromising the confidentiality, integrity, and
availability of the Confluence instance.

Please enable JavaScript



Video Player is loading.
Play Video
Play
Unmute

Current Time 0:00
/
Duration 10:27
00:00






Remaining Time -10:27
1x
Playback Rate

Captions

Auto(360pLQ)

Fullscreen
Settings
 * Settings
 * SubtitlesCaptions Off
 * Speed1x
 * Qualityauto

 * Back
 * captions off, selected
 * American English Captions

 * Back
 * 2x
 * 1.5x
 * 1x, selected
 * 0.5x

 * Back
 * 1080pFHD
 * 720pHD
 * Auto(360pLQ)

Watch on HumixShare






IBM Guardium V11 2 Lab - 7. Vulnerability Assessment
Share
Watch on




Atlassian has released security updates for various Confluence versions,
strongly urging users to upgrade to the latest patched versions immediately. The
company also provides alternative fixes for specific versions, ensuring a wider
range of users can mitigate the risk.

In addition to CVE-2024-21683, Atlassian’s latest update has addressed 36 other
vulnerabilities across multiple products, including Confluence, Bamboo,
Bitbucket, Crowd, Jira, and Jira Service Management. Of these, two have been
rated critical, while the remaining 35 are classified as “High.” Excluding
product overlaps, there are 32 unique CVE-based vulnerabilities.

The critical vulnerabilities involve an SQL injection flaw in the PostgreSQL
JDBC driver, tracked as CVE-2024-1597, affecting Confluence and Jira.

Organizations using Confluence Data Center and Server should promptly upgrade to
the recommended versions to mitigate the risk of remote code execution and other
potential threats. For detailed information and patch downloads, please refer to
Atlassian’s official advisory page.




Share







Tags: AtlassianCVE-2024-21683CVE-2024–1597

 * Previous story Broadcom Security Alert: VMware Vulnerabilities Expose Data,
   Enable Attacks



Follow:

 * 
 * 
 * 
 * 
 * 
 * 


SEARCH



Secure Your Connection


 * Popular Posts
 * Tags

 * Vulnerability
   
   CVE-2024-21683: Atlassian Patches RCE Flaw in Confluence Data Center and
   Server
   
   May 21, 2024

 * Vulnerability
   
   Oracle VirtualBox Elevation of Privilege Vulnerability (CVE-2024-21111): PoC
   Published
   
   April 22, 2024

 * Cyber Security / Malware
   
   ToddyCat: Unveiling the Stealthy APT Group Targeting Asia-Pacific Governments
   
   April 22, 2024

 * Vulnerability
   
   CVE-2024-4040: CrushFTP Users Targeted in Zero-Day Attack Campaign
   
   April 22, 2024

 * Malware
   
   Sharp Stealer: New Malware Targets Gamers’ Accounts and Online Identities
   
   April 22, 2024

 * active directory AMD android Apple backdoor BurpSuite chrome CISA cisco
   cyberattack Data Breach facebook gitlab google google chrome hacker kali
   linux Linux Linux Kernel macOS malware metasploit Microsoft nmap nvidia OSINT
   penetration testing Pentesting PoC powershell privilege escalation Python
   ransomware shodan sqli sql injection ssh vmware Vulnerability web app
   webshell windows wireless wordpress XSS





Reward


BRILLIANTLY

SAFE!




securityonline.info


CONTENT & LINKS

Verified by Sur.ly



2022


WEBSITE

 1. About SecurityOnline.info
 2. Advertise on SecurityOnline.info
 3. Contact



 * About Us
 * Contact Us
 * Disclaimer
 * Privacy Policy
 * DMCA NOTICE

Penetration Testing © 2024. All Rights Reserved.

 * 
 * 
 * 
 * 
 * 
 * 


x
x

✕


🍪 DATENSCHUTZ & TRANSPARENZ

Wir und unsere Partner verwenden Cookies, um Speichern von oder Zugriff auf
Informationen auf einem Endgerät zu können. Wir und unsere Partner verwenden
Daten für Personalisierte Werbung und Inhalte, Messung von Werbeleistung und der
Performance von Inhalten, Zielgruppenforschung sowie Entwicklung und
Verbesserung von Angeboten. Ein Beispiel für Daten, welche verarbeitet werden,
kann eine in einem Cookie gespeicherte eindeutige Kennung sein. Einige unserer
Partner können Ihre Daten im Rahmen ihrer legitimen Geschäftsinteressen
verarbeiten, ohne Ihre Zustimmung einzuholen. Um die Verwendungszwecke
einzusehen, für die diese ihrer Meinung nach ein berechtigtes Interesse haben,
oder um dieser Datenverarbeitung zu widersprechen, verwenden Sie den unten
stehenden Link zur Anbieterliste. Die übermittelte Einwilligung wird nur für die
von dieser Webseite ausgehende Datenverarbeitung verwendet. Wenn Sie Ihre
Einstellungen ändern oder Ihre Einwilligung jederzeit widerrufen möchten, finden
Sie den Link dazu in unserer Datenschutzerklärung, die von unserer Homepage aus
zugänglich ist

856 Partners are included for the above purposes.



Einstellungen verwalten Nur notwendige Cookies Weiter mit den empfohlenen
Cookies

Anbieter-Liste | Datenschutzerklärung