securityaffairs.co Open in urlscan Pro
2001:8d8:100f:f000::289  Public Scan

URL: https://securityaffairs.co/wordpress/121760/hacking/confluence-cve-2021-26084-rce.html
Submission: On September 02 via api from US

Form analysis 1 forms found in the DOM

Name: searchformGET https://securityaffairs.co/wordpress/

<form role="search" method="get" name="searchform" id="searchform" action="https://securityaffairs.co/wordpress/">
  <div>
    <input type="text" value="" name="s" id="s" autocomplete="off" title="Search..." class="blur">
    <button type="submit">
      <i class="fa fa-search"></i>
    </button>
  </div>
  <div id="autocomplete"></div>
</form>

Text Content

 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * EXTENDED COOKIE POLICY
 * Contact me


MUST READ

Headlines
 * Attackers are attempting to exploit recently patched Atlassian Confluence
   CVE-2021-26084 RCE
 * Cyber Defense Magazine – September 2021 has arrived. Enjoy it!
 * Cisco fixes a critical flaw in Enterprise NFVIS for which PoC exploit exists
 * Google paid over $130K in bounty rewards for the issues addressed with the
   release of Chrome 93
 * Mozi infections will slightly decrease but it will stay alive for some time
   to come
 * QNAP will patche OpenSSL flaws in its NAS devices



 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * EXTENDED COOKIE POLICY
 * Contact me


ATTACKERS ARE ATTEMPTING TO EXPLOIT RECENTLY PATCHED ATLASSIAN CONFLUENCE
CVE-2021-26084 RCE

September 2, 2021  By Pierluigi Paganini




THREAT ACTORS ARE ACTIVELY EXPLOITING A RECENTLY PATCHED VULNERABILITY IN
ATLASSIAN’S CONFLUENCE ENTERPRISE COLLABORATION PRODUCT.

Threat actors were spotted exploiting the CVE-2021-26084 vulnerability in
Atlassian’s Confluence enterprise collaboration product a few days after it was
patched by the vendor.



Last week, Atlassian released security patches to address the
critical CVE-2021-26084 flaw that affects the Confluence enterprise
collaboration product.



The flaw is an OGNL injection issue that can be exploited by an authenticated
attacker to execute arbitrary code on affected Confluence Server and Data Center
instances.

“An OGNL injection vulnerability exists that would allow an authenticated user,
and in some instances unauthenticated user, to execute arbitrary code on a
Confluence Server or Data Center instance. ” reads the advisory published by the
company.

The issue was discovered by Benny Jacob (SnowyOwl) through the Atlassian public
bug bounty program, the vulnerability received a CVSS score of 9.8.

Affected versions are:

 * version < 6.13.23
 * 6.14.0 ≤ version < 7.4.11
 * 7.5.0 ≤ version < 7.11.5
 * 7.12.0 ≤ version < 7.12.5

Researchers from Threat intelligence firm Bad Packets detected mass scanning and
exploit activity targeting Atlassian Confluence servers vulnerable to the above
RCE.



Internet scans for systems affected by the CVE-2021-26084 flaw were also spotted
by other researchers, the Japan CERT issued a security alert regarding this
flaw. https://jpcert.or.jp/english/at/2021/at210037.html

“On September 2, 2021 (Japan time), JPCERT/CC confirmed that an article
explaining the details of this vulnerability and Proof-of-Concept code that
seems to exploit the vulnerability are made public. The users of the affected
products are recommended to take measures such as upgrading to the latest
version or apply workaround as soon as possible.” reads the alert from the Japan
CERT.



Australian ACSC also issued an alert for CVE-2021-26084 due to ongoing
exploitation attempts in the wild.




Technical details and POC for Confluence RCE (CVE-2021-26084) are available
here:



Experts believe that the number of attacks targeting this Confluence
vulnerability will increase in the next weeks.

Follow me on Twitter: @securityaffairs and Facebook



Pierluigi Paganini

(SecurityAffairs – hacking, FIN8)







Share this...

Facebook
Twitter
Linkedin


SHARE THIS:

 * Twitter
 * Print
 * LinkedIn
 * Facebook
 * More
 * 

 * Tumblr
 * Pocket
 * 
 * 


AtlassianConfluenceHackinghacking newsinformation security newsIT Information
SecurityPierluigi PaganiniSecurity AffairsSecurity News


--------------------------------------------------------------------------------

SHARE ON

 * 
 * 
 * 
 * 
 * 
 * 
 * 


PIERLUIGI PAGANINI

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and
Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he
is also a Security Evangelist, Security Analyst and Freelance Writer.
Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security
expert with over 20 years experience in the field, he is Certified Ethical
Hacker at EC Council in London. The passion for writing and a strong belief that
security is founded on sharing and awareness led Pierluigi to find the security
blog "Security Affairs" recently named a Top National Security Resource for US.
Pierluigi is a member of the "The Hacker News" team and he is a writer for some
major publications in the field such as Cyber War Zone, ICTTF, Infosec Island,
Infosec Institute, The Hacker News Magazine and for many other Security
magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency
and Bitcoin”.




--------------------------------------------------------------------------------

PREVIOUS ARTICLE

Cyber Defense Magazine – September 2021 has arrived. Enjoy it!


--------------------------------------------------------------------------------





YOU MIGHT ALSO LIKE


CYBER DEFENSE MAGAZINE – SEPTEMBER 2021 HAS ARRIVED. ENJOY IT!

September 2, 2021  By Pierluigi Paganini

CISCO FIXES A CRITICAL FLAW IN ENTERPRISE NFVIS FOR WHICH POC EXPLOIT EXISTS

September 2, 2021  By Pierluigi Paganini






 * SPONSORED CONTENT

 * 


 * PIXFUTURE


 * DIGGING THE DEEP WEB: EXPLORING THE DARK SIDE OF THE WEB


 * SECURITYAFFAIRS AWARDED AS BEST EUROPEAN CYBERSECURITY TECH BLOG AT EUROPEAN
   CYBERSECURITY BLOGGER AWARDS


 * CENTER FOR CYBER SECURITY AND INTERNATIONAL RELATIONS STUDIES


 * SUBSCRIBE SECURITY AFFAIRS NEWSLETTER




More Story

CYBER DEFENSE MAGAZINE – SEPTEMBER 2021 HAS ARRIVED. ENJOY IT!

Cyber Defense Magazine September 2021 Edition has arrived. We hope you enjoy
this month’s edition…packed with 161 pages...
Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * EXTENDED COOKIE POLICY
 * Contact me

This site uses cookies, including for analytics, personalization, and
advertising purposes. For more information or to change your cookie settings,
click here.

If you continue to browse this site without changing your cookie settings, you
agree to this use.
Accept Read More
Privacy and Cookies Policy
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
This category only includes cookies that ensures basic functionalities and
security features of the website. These cookies do not store any personal
information.
Non-necessary
Non-necessary
Any cookies that may not be particularly necessary for the website to function
and is used specifically to collect user personal data via analytics, ads, other
embedded contents are termed as non-necessary cookies. It is mandatory to
procure user consent prior to running these cookies on your website.
SAVE & ACCEPT