Atlassian Bamboo Data Center/Bamboo Server up to 9.3.3 Privilege Escalation
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.2 | $0-$5k | 0.00 |
A vulnerability classified as critical was found in Atlassian Bamboo Data Center and Bamboo Server. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 8.1.0, 8.2.0, 9.0.0, 9.1.0, 9.2.0, and 9.3.0 of Bamboo Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Bamboo Data Center and Server 9.2: Upgrade to a release greater than or equal to 9.2.7. JDK 1.8u121+ should be used in case Java 8 used to run Bamboo Data Center and Server. See Bamboo 9.2 Upgrade notes (https://confluence.atlassian.com/bambooreleases/bamboo-9-2-upgrade-notes-1207179212.html) Bamboo Data Center and Server 9.3: Upgrade to a release greater than or equal to 9.3.4 See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives]). This vulnerability was discovered by a private user and reported via our Bug Bounty program
The weakness was disclosed 11/21/2023. The advisory is shared at confluence.atlassian.com. This vulnerability is known as CVE-2023-22516 since 01/01/2023. Neither technical details nor an exploit are publicly available.
Upgrading to version 8.1.0, 9.2.7 or 9.3.4 eliminates this vulnerability.
The entry VDB-245918 is pretty similar.
Product
Vendor
Name
Version
- 8.1.0
- 8.1.1
- 8.1.2
- 8.1.3
- 8.1.4
- 8.1.5
- 8.1.6
- 8.1.7
- 8.1.9
- 8.1.10
- 8.1.11
- 8.1.12
- 8.2.0
- 8.2.1
- 8.2.2
- 8.2.3
- 8.2.4
- 8.2.5
- 8.2.6
- 8.2.7
- 8.2.8
- 8.2.9
- 9.0.0
- 9.0.1
- 9.0.2
- 9.0.3
- 9.1.0
- 9.1.1
- 9.1.2
- 9.1.3
- 9.2.1
- 9.2.3
- 9.2.4
- 9.2.5
- 9.2.6
- 9.3.0
- 9.3.1
- 9.3.2
- 9.3.3
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔒VulDB CVSS-BT Score: 🔒
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.3VulDB Meta Temp Score: 8.2
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔒
VulDB Reliability: 🔍
NVD Base Score: 8.8
NVD Vector: 🔒
CNA Base Score: 8.5
CNA Vector (Atlassian): 🔒
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Privilege EscalationCWE: Unknown
CAPEC: 🔒
ATT&CK: 🔒
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Upgrade: Bamboo Data Center/Bamboo Server 8.1.0/9.2.7/9.3.4
Timeline
01/01/2023 CVE reserved11/21/2023 Advisory disclosed
11/21/2023 VulDB entry created
12/15/2023 VulDB entry last update
Sources
Vendor: atlassian.comAdvisory: confluence.atlassian.com
Status: Confirmed
CVE: CVE-2023-22516 (🔒)
See also: 🔒
Entry
Created: 11/21/2023 19:34Updated: 12/15/2023 12:33
Changes: 11/21/2023 19:34 (47), 12/15/2023 12:33 (11)
Complete: 🔍
Cache ID: 3:A72:103
No comments yet. Languages: en.
Please log in to comment.