The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
This indicates an attack attempt to exploit a Directory Traversal vulnerability in Atlassian Confluence.The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. Successful attacks may allow a remote attackers to use a specially crafted request with directory-traversal sequences to retrieve sensitive information and remote code execution.
Atlassian Confluence Server before version 6.6.12
Atlassian Confluence Server from version 6.7.0 before 6.12.3
Atlassian Confluence Server from version 6.13.0 before 6.13.3
Atlassian Confluence Server from version 6.14.0 before 6.14.2
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Apply patch if available from the vendor's website.
https://jira.atlassian.com/browse/CONFSERVER-57974
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
https://paper.seebug.org/886/ | 59 |
https://wiki | 5 |
http://bit.ly/2H7b77c | 3 |
User | URL | Info Source | Date |
---|---|---|---|
eric_capuano | https://blog.reconinfosec.com/analysis-of-exploitation-of-c... | Source eric_capuano 1532514310605373463 | 2022/06/03 |
Recon_InfoSec | https://blog.reconinfosec.com/analysis-of-exploitation-of-c... | Source Recon_InfoSec 1532526015188180997 | 2022/06/03 |
ipssignatures | https://twitter.com/Recon_InfoSec/status/1532526015188180997 | Source ipssignatures 1532815890336587778 | 2022/06/04 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
paper.seebug.org | 59 |
wiki | 5 |
bit.ly | 3 |
User | URL | Info Source |
---|---|---|
eric_capuano | blog.reconinfosec.com | Show Tweet |
Recon_InfoSec | blog.reconinfosec.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
Name | URL |
---|---|
Yt1g3r/CVE-2019-3396_EXP | https://github.com/Yt1g3r/CVE-2019-3396_EXP |
jas502n/CVE-2019-3396 | https://github.com/jas502n/CVE-2019-3396 |
pyn3rd/CVE-2019-3396 | https://github.com/pyn3rd/CVE-2019-3396 |
x-f1v3/CVE-2019-3396 | https://github.com/x-f1v3/CVE-2019-3396 |
dothanthitiendiettiende/CVE-2019-3396 | https://github.com/dothanthitiendiettiende/CVE-2019-3396 |
abdallah-elsharif/cve-2019-3396 | https://github.com/abdallah-elsharif/cve-2019-3396 |
JonathanZhou348/CVE-2019-3396TEST | https://github.com/JonathanZhou348/CVE-2019-3396TEST |
vntest11/confluence_CVE-2019-3396 | https://github.com/vntest11/confluence_CVE-2019-3396 |
yuehanked/cve-2019-3396 | https://github.com/yuehanked/cve-2019-3396 |
xiaoshuier/CVE-2019-3396 | https://github.com/xiaoshuier/CVE-2019-3396 |
Name | URL |
---|---|
Yt1g3r/CVE-2019-3396_EXP | github.com |
jas502n/CVE-2019-3396 | github.com |
pyn3rd/CVE-2019-3396 | github.com |
x-f1v3/CVE-2019-3396 | github.com |
dothanthitiendiettiende/CVE-2019-3396 | github.com |
abdallah-elsharif/cve-2019-3396 | github.com |
JonathanZhou348/CVE-2019-3396TEST | github.com |
vntest11/confluence_CVE-2019-3396 | github.com |
yuehanked/cve-2019-3396 | github.com |
xiaoshuier/CVE-2019-3396 | github.com |