Vulnerability Description
Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Confluence Server | >= 2.0, < 6.6.13 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-TThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-DirectorExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-DirectorThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/108067Broken LinkThird Party AdvisoryVDB Entry
- https://jira.atlassian.com/browse/CONFSERVER-58102Issue TrackingPatchVendor Advisory
- https://seclists.org/bugtraq/2019/Apr/33Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-TThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/155235/Atlassian-Confluence-6.15.1-DirectorExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-DirectorThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/108067Broken LinkThird Party AdvisoryVDB Entry
- https://jira.atlassian.com/browse/CONFSERVER-58102Issue TrackingPatchVendor Advisory
- https://seclists.org/bugtraq/2019/Apr/33Mailing ListThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-US Government Resource
FAQ
What is CVE-2019-3398?
CVE-2019-3398 is a vulnerability with a CVSS score of 8.8 (HIGH). Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to creat...
How severe is CVE-2019-3398?
CVE-2019-3398 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-3398?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Confluence Server.