In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
                
            References
                    | Link | Resource | 
|---|---|
| https://jira.atlassian.com/browse/CONFSERVER-79016 | Patch Vendor Advisory | 
| http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html | Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html | Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry | 
| http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html | Exploit Third Party Advisory VDB Entry | 
| https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2022-06-03 15:15
Updated : 2022-06-29 23:15
NVD link : CVE-2022-26134
Mitre link : CVE-2022-26134
JSON object : View
CWE
                
                    
                        
                        CWE-74
                        
            Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
                atlassian
- confluence_data_center
 - confluence_server
 


