CVE-2023-22518
📋 TL;DR
CVE-2023-22518 is an improper authorization vulnerability in Confluence Data Center and Server that allows unauthenticated attackers to reset the application and create administrator accounts. This leads to complete system compromise with administrative privileges. Only self-hosted Confluence instances are affected - Atlassian Cloud sites are not vulnerable.
💻 Affected Systems
- Confluence Data Center
- Confluence Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover: attacker gains full administrative control, can exfiltrate all data, modify/delete content, install backdoors, and disrupt availability.
Likely Case
Data breach and system compromise: attacker creates admin account, accesses sensitive information, and potentially deploys ransomware or other malware.
If Mitigated
Limited impact if network segmentation and access controls prevent external access to Confluence instances.
🎯 Exploit Status
Exploitation is trivial and requires no authentication. Public exploit code is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed versions: 8.3.3, 8.4.3, 8.5.2 or later
Vendor Advisory: https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
Restart Required: Yes
Instructions:
1. Backup your Confluence instance. 2. Download and install the fixed version from Atlassian's website. 3. Restart Confluence. 4. Verify the fix by checking the version.
🔧 Temporary Workarounds
Network Isolation
allRestrict network access to Confluence instances using firewalls or network security groups
Disable Setup Endpoint
linuxBlock access to the vulnerable setup endpoint via web application firewall or reverse proxy
# Example nginx config to block /setup/* endpoints
location ~ ^/setup/ { deny all; }
🧯 If You Can't Patch
- Immediately isolate Confluence instances from internet access using firewalls
- Implement strict network segmentation and monitor for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check if Confluence version is below 8.3.3, 8.4.3, or 8.5.2 and is self-hosted (not atlassian.net domain)
Check Version:
Check Confluence admin panel or view /rest/applinks/1.0/manifest endpoint
Verify Fix Applied:
Verify Confluence version is 8.3.3, 8.4.3, 8.5.2 or later and attempt to access setup endpoints returns proper authorization errors
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access to /setup/* endpoints
- Unexpected administrator account creation
- Confluence reset events
Network Indicators:
- Unusual traffic to Confluence setup endpoints from external IPs
- POST requests to setup endpoints without authentication
SIEM Query:
source="confluence.log" AND (uri_path="/setup/*" OR event="account_created" OR event="system_reset")
🔗 References
- http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
- https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
- https://jira.atlassian.com/browse/CONFSERVER-93142
- http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
- https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
- https://jira.atlassian.com/browse/CONFSERVER-93142
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22518