HTTP: Confluence Pre-Auth OGNL Remote Code Execution

This signature detects attempts to exploit a known vulnerability against the Confluence server and Confluence Data centre. A successful attack can lead to arbitrary code execution.

Extended Description

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.

Affected Products

Atlassian confluence_server

Short Name
HTTP:CONFLUENCE-PRE-AUTH-RCE
Severity
Critical
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2022-26134 Code Confluence Execution OGNL Pre-Auth Remote
Release Date
06/07/2022
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Atlassian

CVSS Score

7.5

Found a potential security threat?