First published: Thu Aug 29 2019(Updated: )
There was a local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting. An attacker with permission to editing a page is able to exploit this issue to read arbitrary file on the server under <install-directory>/confluence/WEB-INF directory, which may contain configuration files used for integrating with other services, which could potentially leak credentials or other sensitive information such as LDAP credentials. The LDAP credential will be potentially leaked only if the Confluence server is configured to use LDAP as user repository. All versions of Confluence Server from 6.1.0 before 6.6.16 (the fixed version for 6.6.x), from 6.7.0 before 6.13.7 (the fixed version for 6.13.x), and from 6.14.0 before 6.15.8 (the fixed version for 6.15.x) are affected by this vulnerability.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Confluence | >=6.1.0<6.6.16 | |
Atlassian Confluence | >=6.7.0<6.13.7 | |
Atlassian Confluence Server | >=6.14.0<6.15.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Confluence Server and Confluence Data Center vulnerability is CVE-2019-3394.
The severity of CVE-2019-3394 is high with a severity value of 8.8.
The local file disclosure vulnerability in Confluence Server and Confluence Data Center via page exporting occurs when an attacker with permission to edit a page exploits the issue to read arbitrary files on the server.
Versions 6.1.0 to 6.6.16 and versions 6.7.0 to 6.13.7 of Atlassian Confluence are affected by CVE-2019-3394.
To fix the local file disclosure vulnerability in Confluence Server and Confluence Data Center, it is recommended to upgrade to a patched version of Confluence Server or Data Center.