CVE-2021-43940

7.8 HIGH

📋 TL;DR

This CVE describes a DLL hijacking vulnerability in Atlassian Confluence Server and Data Center installers on Windows. Authenticated local attackers can exploit this to elevate privileges on the local system. Only Windows installations running affected versions are vulnerable.

💻 Affected Systems

Products:
  • Atlassian Confluence Server
  • Atlassian Confluence Data Center
Versions: Versions before 7.4.10, and versions 7.5.0 through 7.12.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations. Linux and other OS installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated local attacker gains SYSTEM-level privileges, enabling complete compromise of the Windows host where Confluence is installed.

🟠

Likely Case

An authenticated user with local access escalates privileges to install malware, access sensitive data, or pivot to other systems.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to the local Confluence service account, preventing full system compromise.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable over the network.
🏢 Internal Only: HIGH - Internal users with local access to Confluence Windows servers can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated local access to the Windows server. DLL hijacking is a well-known technique with established exploitation methods.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.10 or 7.12.3 and later

Vendor Advisory: https://jira.atlassian.com/browse/CONFSERVER-66550

Restart Required: Yes

Instructions:

1. Backup your Confluence instance. 2. Upgrade to Confluence Server/Data Center 7.4.10 or 7.12.3+. 3. Restart the Confluence service. 4. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict local access

windows

Limit local login access to Confluence Windows servers to only necessary administrative users.

Monitor DLL loading

windows

Implement monitoring for suspicious DLL loading from non-standard locations in Confluence directories.

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local access to Confluence Windows servers
  • Deploy endpoint detection and response (EDR) solutions to monitor for DLL hijacking behavior

🔍 How to Verify

Check if Vulnerable:

Check Confluence version via Admin > General Configuration. If version is before 7.4.10 or between 7.5.0-7.12.2 on Windows, the system is vulnerable.

Check Version:

Check Confluence web interface at Admin > General Configuration or examine confluence/WEB-INF/classes/build.properties file

Verify Fix Applied:

After patching, confirm version is 7.4.10+ or 7.12.3+ via Admin > General Configuration.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing DLL loading from unusual locations
  • Confluence logs showing unexpected process execution

Network Indicators:

  • Unusual outbound connections from Confluence server post-exploitation

SIEM Query:

Windows Event ID 7 (Image loaded) with Confluence process loading DLLs from user-writable directories

🔗 References

📤 Share & Export