-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2014.0064
        A vulnerability has been identified in Atlassian Confluence
                                26 May 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Atlassian Confluence
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
Member content until: Wednesday, June 25 2014

OVERVIEW

        A vulnerability has been identified in Atlassian Confluence up to and
        including version 5.5.


IMPACT

        The vendor has provided the following details regarding the issue:
        
        "We have fixed a vulnerability in our version of an Xwork library 
        which is also part of Apache Struts. Attackers can use this 
        vulnerability to execute Java code of their choice on systems that 
        use these frameworks. The attacker needs to be able to access the 
        Confluence web interface. In cases when anonymous access is enabled,
        a valid user account is not required to exploit this vulnerability.
        
        We have discovered this vulnerability during our review of the 
        recent Struts security advisories. This vulnerability is specific to
        Confluence.
        
        The vulnerability affects all versions of Confluence up to and 
        including 5.5. Confluence 5.5.1 is not vulnerable." [1]


MITIGATION

        The vendor recommends updating to the latest version of Confluence to
        correct this vulnerability.


REFERENCES

        [1] Confluence Security Advisory 2014-05-21
            https://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2014-05-21

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIUAwUBU4LXeBLndAQH1ShLAQK7jg/3S7vSx8oG43jektcU2RbV8DeaPX0hduWz
LDYFIgxwfBL1BPntF6nd0M1NXbcEWPf+/c6nEyi11tGkjCvTu/wXJ5VmR/9B7J4I
dTEqhV5EFGQvZc4TmPkg20sinzt2lef5eAjHfF/2P2+ogwEiAc9tVhlSXEMwVG9c
wCELTSxAQ/PjjmMDGTctq/4ibUBRStScNh+lxn1CVkrm26iWBkDj3utAqjgC+8S0
g7xSN7+HGD/ZX1P0W3+9YhnBB+SdI8GEhvqRRpMSyNGN1TY1UbeTVY2tvDV9GWp3
7hY6KEuMGz8CmXRDgVisKrCYIIeYMS0Rs0LbUlwZnrSbed/fjJkh5l3wYYxS9cO7
3XVyReu1k9hmoBrAIQLU4qzhqBxr9e6siIexF5l/YqOL/7XEuDNlgBqSXY0qZJde
+hJHukC4vedZzMPE0qK/9s9k2mos6DZKU9arpQJeV2WTzfMXN01xFCpzEWmGMFhF
cS/HdPNcsQgK1YU9PtliFU03c+ShZB9AT8uMrnN7YMV+UTvPHaYJoyUtUee4NYcd
ehi2a0J9/4YhhEt5huHzEBVFRC/Kkpq49Eko3tnyMH+bdUGgMp3b6bsMMCzWAFzh
S9aitYfR4iNH1Q9UcDTw3iECtWnzuFCqk8QUjKE7wHqCW0Avh97Ls0ViBA7BBpQp
dwVs+M7V0g==
=73os
-----END PGP SIGNATURE-----