Atlassian Confluence Data Center up to 8.8.0 path traversal
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.1 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Atlassian Confluence Data Center up to 8.8.0 and classified as critical. This vulnerability affects unknown code. Performing a manipulation results in path traversal. This vulnerability is reported as CVE-2024-21677. The attack is possible to be carried out remotely. No exploit exists. The affected component should be upgraded.
Details
A vulnerability classified as critical has been found in Atlassian Confluence Data Center up to 8.8.0. This affects an unknown part. The manipulation with an unknown input leads to a path traversal vulnerability. CWE is classifying the issue as CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
This High severity Path Traversal vulnerability was introduced in version 6.13.0 of Confluence Data Center. This Path Traversal vulnerability, with a CVSS Score of 8.3, allows an unauthenticated attacker to exploit an undefinable vulnerability which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Data Center Atlassian recommends that Confluence Data Center customers upgrade to the latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions: ||Affected versions||Fixed versions|| |8.8.0|8.8.1 recommended| |from 8.7.0 to 8.7.2|8.8.1 recommended| |from 8.6.0 to 8.6.2|8.8.1 recommended| |from 8.5.0 to 8.5.6 LTS|8.8.1 recommended or 8.5.7 LTS| |from 8.4.0 to 8.4.5|8.8.1 recommended or 8.5.7 LTS| |from 8.3.0 to 8.3.4|8.8.1 recommended or 8.5.7 LTS| |from 8.2.0 to 8.2.3|8.8.1 recommended or 8.5.7 LTS| |from 8.1.0 to 8.1.4|8.8.1 recommended or 8.5.7 LTS| |from 8.0.0 to 8.0.4|8.8.1 recommended or 8.5.7 LTS| |from 7.20.0 to 7.20.3|8.8.1 recommended or 8.5.7 LTS| |from 7.19.0 to 7.19.19 LTS|8.8.1 recommended or 8.5.7 LTS or 7.19.20 LTS| |from 7.18.0 to 7.18.3|8.8.1 recommended or 8.5.7 LTS or 7.19.20 LTS| |from 7.17.0 to 7.17.5|8.8.1 recommended or 8.5.7 LTS or 7.19.20 LTS| |Any earlier versions|8.8.1 recommended or 8.5.7 LTS or 7.19.20 LTS| Server {color:#172b4d}Atlassian recommends that Confluence Server customers upgrade to the latest 8.5.x LTS version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions:{color} ||Affected versions||Fixed versions|| |from 8.5.0 to 8.5.6 LTS|8.5.7 LTS recommended| |from 8.4.0 to 8.4.5|8.5.7 LTS recommended| |from 8.3.0 to 8.3.4|8.5.7 LTS recommended| |from 8.2.0 to 8.2.3|8.5.7 LTS recommended| |from 8.1.0 to 8.1.4|8.5.7 LTS recommended| |from 8.0.0 to 8.0.4|8.5.7 LTS recommended| |from 7.20.0 to 7.20.3|8.5.7 LTS recommended| |from 7.19.0 to 7.19.19 LTS|8.5.7 LTS recommended or 7.19.20 LTS| |from 7.18.0 to 7.18.3|8.5.7 LTS recommended or 7.19.20 LTS| |from 7.17.0 to 7.17.5|8.5.7 LTS recommended or 7.19.20 LTS| |Any earlier versions|8.5.7 LTS recommended or 7.19.20 LTS| See the release notes ([https://confluence.atlassian.com/doc/confluence-release-notes-327.html]). You can download the latest version of Confluence Data Center and Server from the download center ([https://www.atlassian.com/software/confluence/download-archives]). This vulnerability was reported via our Bug Bounty program.
The advisory is shared at confluence.atlassian.com. This vulnerability is uniquely identified as CVE-2024-21677 since 01/01/2024. The exploitability is told to be difficult. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. It demands that the victim is doing some kind of user interaction. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1006 for this issue.
Upgrading to version 7.19.20, 8.5.7 or 8.8.1 eliminates this vulnerability.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.atlassian.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.2VulDB Meta Temp Score: 8.1
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.8
NVD Vector: 🔍
CNA Base Score: 8.3
CNA Vector (Atlassian): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Path traversalCWE: CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Confluence Data Center 7.19.20/8.5.7/8.8.1
Timeline
01/01/2024 🔍03/19/2024 🔍
03/19/2024 🔍
04/14/2025 🔍
Sources
Vendor: atlassian.comAdvisory: confluence.atlassian.com
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2024-21677 (🔍)
GCVE (CVE): GCVE-0-2024-21677
GCVE (VulDB): GCVE-100-257337
Entry
Created: 03/19/2024 18:41Updated: 04/14/2025 02:45
Changes: 03/19/2024 18:41 (64), 03/13/2025 19:30 (13), 04/14/2025 02:45 (3)
Complete: 🔍
Cache ID: 216::103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.