CVE-2024-21677

8.8 HIGH

📋 TL;DR

This is a high-severity path traversal vulnerability (CWE-22) in Confluence Data Center and Server that allows unauthenticated attackers to access or manipulate files outside intended directories. It affects Confluence versions starting from 6.13.0, putting organizations using these versions at risk of data exposure or system compromise.

💻 Affected Systems

Products:
  • Confluence Data Center
  • Confluence Server
Versions: 6.13.0 and later versions before patched releases
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Data Center and Server editions. Version 6.13.0 introduced the vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file read/write leading to sensitive data exposure, privilege escalation, or remote code execution.

🟠

Likely Case

Unauthorized access to configuration files, source code, or sensitive data stored on the Confluence server.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and monitoring in place.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation makes internet-facing instances particularly vulnerable to automated attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires initial access to internal network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 8.8 indicates high exploitability. Unauthenticated nature lowers barrier to exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version or specified fixed versions in release notes

Vendor Advisory: https://confluence.atlassian.com/pages/viewpage.action?pageId=1369444862

Restart Required: Yes

Instructions:

1. Backup your Confluence instance. 2. Download latest version from Atlassian download center. 3. Follow upgrade procedures in Confluence documentation. 4. Restart Confluence service. 5. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to Confluence instances to trusted networks only

Web Application Firewall Rules

all

Implement WAF rules to block path traversal patterns

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Confluence instances
  • Enable detailed logging and monitoring for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check Confluence version via Administration → General Configuration or via system info page

Check Version:

Check Confluence version via web interface or examine confluence.cfg.xml file

Verify Fix Applied:

Verify version is updated to patched release and test path traversal attempts return appropriate errors

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Requests with ../ sequences
  • Access to files outside webroot

Network Indicators:

  • Multiple failed path traversal attempts
  • Unusual file download patterns

SIEM Query:

web.url:*../* AND (dst.port:8090 OR dst.port:8443)

🔗 References

📤 Share & Export