First published: Thu Apr 27 2017(Updated: )
Atlassian Confluence 6.x before 6.0.7 allows remote attackers to bypass authentication and read any blog or page via the drafts diff REST resource.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Confluence Server and Data Server | =6.0.0 | |
Atlassian Confluence Server and Data Server | =6.0.1 | |
Atlassian Confluence Server and Data Server | =6.0.2 | |
Atlassian Confluence Server and Data Server | =6.0.3 | |
Atlassian Confluence Server and Data Server | =6.0.4 | |
Atlassian Confluence Server and Data Server | =6.0.5 | |
Atlassian Confluence Server and Data Server | =6.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7415 has a high severity rating due to its potential for unauthorized access to sensitive information.
To resolve CVE-2017-7415, upgrade Atlassian Confluence to version 6.0.7 or later.
CVE-2017-7415 affects Atlassian Confluence versions 6.0.0 to 6.0.6.
Yes, CVE-2017-7415 allows remote attackers to read blogs or pages, potentially leading to data breaches.
Currently, there is no official workaround for CVE-2017-7415 other than upgrading to a fixed version.