26 May 2014
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0064 A vulnerability has been identified in Atlassian Confluence 26 May 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Atlassian Confluence Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade Member content until: Wednesday, June 25 2014 OVERVIEW A vulnerability has been identified in Atlassian Confluence up to and including version 5.5. IMPACT The vendor has provided the following details regarding the issue: "We have fixed a vulnerability in our version of an Xwork library which is also part of Apache Struts. Attackers can use this vulnerability to execute Java code of their choice on systems that use these frameworks. The attacker needs to be able to access the Confluence web interface. In cases when anonymous access is enabled, a valid user account is not required to exploit this vulnerability. We have discovered this vulnerability during our review of the recent Struts security advisories. This vulnerability is specific to Confluence. The vulnerability affects all versions of Confluence up to and including 5.5. Confluence 5.5.1 is not vulnerable."  MITIGATION The vendor recommends updating to the latest version of Confluence to correct this vulnerability. REFERENCES  Confluence Security Advisory 2014-05-21 https://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2014-05-21 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: email@example.com Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIUAwUBU4LXeBLndAQH1ShLAQK7jg/3S7vSx8oG43jektcU2RbV8DeaPX0hduWz LDYFIgxwfBL1BPntF6nd0M1NXbcEWPf+/c6nEyi11tGkjCvTu/wXJ5VmR/9B7J4I dTEqhV5EFGQvZc4TmPkg20sinzt2lef5eAjHfF/2P2+ogwEiAc9tVhlSXEMwVG9c wCELTSxAQ/PjjmMDGTctq/4ibUBRStScNh+lxn1CVkrm26iWBkDj3utAqjgC+8S0 g7xSN7+HGD/ZX1P0W3+9YhnBB+SdI8GEhvqRRpMSyNGN1TY1UbeTVY2tvDV9GWp3 7hY6KEuMGz8CmXRDgVisKrCYIIeYMS0Rs0LbUlwZnrSbed/fjJkh5l3wYYxS9cO7 3XVyReu1k9hmoBrAIQLU4qzhqBxr9e6siIexF5l/YqOL/7XEuDNlgBqSXY0qZJde +hJHukC4vedZzMPE0qK/9s9k2mos6DZKU9arpQJeV2WTzfMXN01xFCpzEWmGMFhF cS/HdPNcsQgK1YU9PtliFU03c+ShZB9AT8uMrnN7YMV+UTvPHaYJoyUtUee4NYcd ehi2a0J9/4YhhEt5huHzEBVFRC/Kkpq49Eko3tnyMH+bdUGgMp3b6bsMMCzWAFzh S9aitYfR4iNH1Q9UcDTw3iECtWnzuFCqk8QUjKE7wHqCW0Avh97Ls0ViBA7BBpQp dwVs+M7V0g== =73os -----END PGP SIGNATURE-----