Atlassian Confluence - Arbitrary File Read (CVE-2021-26085)
- Severity
- CVSSv3 Score
- 5.3
- Vulnerability description
Atlassian Confluence is affected by a Pre-Authorization Arbitrary File Read vulnerability in the
/s/
endpoint. This allows attackers to read sensitive information from the target system by sending a special crafted HTTP GET request to the vulnerable endpoint. The affected endpoints are/WEB-INF/web.xml
,/WEB-INF/decorators.xml
,/WEB-INF/classes/seraph-config.xml
,META-INF/maven/com.atlassian.confluence/confluence-webapp/pom.xml
andMETA-INF/maven/com.atlassian.confluence/confluence-webapp/pom.properties
.- Risk description
The risk exists that a remote unauthenticated attacker could exploit this vulnerability to read sensitive information from arbitrary files located on the file system of the server.
- Exploit capabilities
Sniper can read arbitrary files from the target system and extract them as evidence.
- Recommendation
Upgrade the Atlassian Confluence to the latest version.
- References
https://nvd.nist.gov/vuln/detail/CVE-2021-26085
https://jira.atlassian.com/browse/CONFSERVER-67893?src=confmacro
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Aug 2021
- Published at
- Updated at
- Software Type
- Collaboration software
- Vendor
- Atlassian
- Product
- Confluence