Summary
This critical vulnerability, defined as CVE-2023-22527 (CVSS 3.0: 10.0), is susceptible to template-injection techniques and affects versions of the software that are out-of-date. If exploited, it can execute code remotely. Users of affected versions are urged by Atlassian to remediate this vulnerability immediately.
Impact Assessment
Atlassian rates this vulnerability as CVSS 10.0 because it has a high impact on confidentiality, integrity, and availability. The versions impacted are Server 8 versions released before December 5, 2023, and version 8.4.5 which is no longer supported by the vendor.
Remediation
Check for affected versions in your environment, including Confluence data centers and servers. If your installed version is affected, remediate by updating those instances.
Business Implications
This vulnerability is not known to be exploited in the wild, but failure to remediate this vulnerability leaves your data centers and servers open to attack. Exploitation can lead to monetary, reputational, and data loss.
Access Point Technology Recommendations
Update
We recommend following vendor instructions to update Confluence data centers and servers to the latest versions.
Associated Bulletins
https://confluence.atlassian.com/security/cve-2023-22527-rce-remote-code-execution-vulnerability-in-confluence-data-center-and-confluence-server-1333990257.html
https://www.cve.org/CVERecord?id=CVE-2023-22527
https://nvd.nist.gov/vuln/detail/CVE-2023-22527