all InfoSec news
Atlassian Confluence Remote Code Execution (CVE-2023-22527)
Feb. 1, 2024, 5:50 p.m. |
FortiGuard Labs | FortiGuard Center - Threat Signal Report fortiguard.fortinet.com
On Jan 16 2024, Atlassian released an advisory for a template injection vulnerability on Confluence Data Center and Server. That can allow an unauthenticated attacker to remotely execute malicious code on affected versions. This vulnerability is rated with a severity level of 10.0 (Critical).
What is the Vendor Solution?
Atlassian highly recommend to apply the latest version available as listed on their advisory. [ Link ]
What FortiGuard Coverage is available?
FortiGuard Labs has an IPS …
advisory atlassian atlassian confluence attacker can center code code execution confluence confluence data center critical cve data data center injection malicious remote code remote code execution server severity solution template template injection unauthenticated vendor vulnerability what is
More from fortiguard.fortinet.com / FortiGuard Labs | FortiGuard Center - Threat Signal Report
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)
@ WWC Global | Reston, Virginia, United States
Security Architect (DevSecOps)
@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium
Infrastructure Security Architect
@ Ørsted | Kuala Lumpur, MY
Contract Penetration Tester
@ Evolve Security | United States - Remote
Senior Penetration Tester
@ DigitalOcean | Canada