CVE-2024-21673

8.8 HIGH

📋 TL;DR

This is a high-severity Remote Code Execution vulnerability in Atlassian Confluence Data Center and Server that allows authenticated attackers to execute arbitrary code on affected systems. It affects Confluence versions 7.13.0 and later, putting organizations using these versions at risk of complete system compromise.

💻 Affected Systems

Products:
  • Atlassian Confluence Data Center
  • Atlassian Confluence Server
Versions: 7.13.0 and later, before fixed versions
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication but any authenticated user can potentially exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining full control over the Confluence server, accessing sensitive data, modifying content, and using the server as a pivot point to attack other internal systems.

🟠

Likely Case

Authenticated attackers (including regular users) executing arbitrary commands to steal sensitive data, install backdoors, or disrupt Confluence availability.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and minimal user privileges, though authenticated users could still cause damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access but the technical complexity appears moderate based on CVSS scoring.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.19.18, 8.5.5, 8.7.2 or higher

Vendor Advisory: https://confluence.atlassian.com/security/security-bulletin-january-16-2024-1333335615.html

Restart Required: Yes

Instructions:

1. Backup your Confluence instance and database. 2. Download the appropriate fixed version from Atlassian's download center. 3. Follow Atlassian's upgrade documentation for your version. 4. Restart Confluence services after upgrade. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict user access

all

Limit authenticated user access to only essential personnel while planning upgrade

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Confluence servers from critical systems
  • Enforce principle of least privilege for all Confluence user accounts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Confluence version via Administration → General Configuration → System Information, or run: grep -i 'confluence.version' confluence/WEB-INF/classes/build.properties

Check Version:

grep -i 'confluence.version' confluence/WEB-INF/classes/build.properties

Verify Fix Applied:

Verify version is 7.19.18+, 8.5.5+, or 8.7.2+ using same methods as checking vulnerability

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution patterns
  • Suspicious Java class loading
  • Unexpected system command execution

Network Indicators:

  • Unusual outbound connections from Confluence server
  • Suspicious payloads in HTTP requests

SIEM Query:

source="confluence.log" AND ("ProcessBuilder" OR "Runtime.exec" OR suspicious command patterns)

🔗 References

📤 Share & Export