CVE-2023-22515
📋 TL;DR
CVE-2023-22515 is a critical vulnerability in Atlassian Confluence Data Center and Server that allows unauthenticated attackers to create administrator accounts and gain full control of affected instances. Only self-hosted Confluence installations are affected - Atlassian Cloud instances are not vulnerable. This vulnerability has a CVSS score of 9.8, indicating critical severity.
💻 Affected Systems
- Atlassian Confluence Data Center
- Atlassian Confluence Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of Confluence instance leading to data theft, ransomware deployment, lateral movement to connected systems, and persistent backdoor access.
Likely Case
Unauthorized administrator account creation leading to data exfiltration, configuration changes, and potential ransomware deployment.
If Mitigated
Limited impact if proper network segmentation, authentication controls, and monitoring are in place to detect and block exploitation attempts.
🎯 Exploit Status
Exploit code is publicly available and requires no authentication. Multiple threat actors have been observed exploiting this vulnerability in the wild.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed versions: 8.3.3, 8.4.3, 8.5.2 (LTS) and later
Vendor Advisory: https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276
Restart Required: Yes
Instructions:
1. Backup your Confluence instance. 2. Download and install the fixed version from Atlassian's website. 3. Restart Confluence. 4. Verify the patch is applied by checking the version number.
🔧 Temporary Workarounds
Block Access to Setup Endpoint
allTemporarily block access to the vulnerable setup endpoint via web server configuration or firewall rules
# For Apache: RewriteRule ^/setup/setupadministrator.action - [F,L]
# For Nginx: location ~ ^/setup/setupadministrator.action { return 403; }
Network Isolation
linuxRestrict network access to Confluence instances to trusted IP addresses only
# Example iptables rule: iptables -A INPUT -p tcp --dport 8090 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 8090 -j DROP
🧯 If You Can't Patch
- Immediately take Confluence instances offline if they cannot be patched
- Implement strict network access controls to limit exposure to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check if Confluence version is below 8.3.3, 8.4.3, or 8.5.2. Also check if /setup/setupadministrator.action endpoint is accessible without authentication.
Check Version:
Check Confluence admin interface or view confluence/WEB-INF/classes/build.properties file
Verify Fix Applied:
Verify Confluence version is 8.3.3, 8.4.3, 8.5.2 or later. Test that /setup/setupadministrator.action endpoint returns appropriate error or requires authentication.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access to /setup/setupadministrator.action endpoint
- New administrator account creation from unusual IP addresses
- Failed authentication attempts followed by successful setup endpoint access
Network Indicators:
- HTTP POST requests to /setup/setupadministrator.action from external IPs
- Unusual outbound connections from Confluence server after exploitation
SIEM Query:
source="confluence.log" AND (uri="/setup/setupadministrator.action" OR message="Created user" OR message="Administrator account")
🔗 References
- http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html
- https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515
- https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276
- https://jira.atlassian.com/browse/CONFSERVER-92475
- http://packetstormsecurity.com/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Execution.html
- https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515
- https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276
- https://jira.atlassian.com/browse/CONFSERVER-92475
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22515