First published: Fri May 07 2021(Updated: )
Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Confluence Server | <7.4.8 | |
Atlassian Confluence Server | >=7.5.0<7.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Confluence Server vulnerability is CVE-2020-29445.
The affected software for this vulnerability is Atlassian Confluence Server versions before 7.4.8 and versions from 7.5.0 before 7.11.0.
The severity of CVE-2020-29445 is medium with a CVSS score of 4.3.
CVE-2020-29445 is a blind server-side request forgery vulnerability in Team Calendars parameters of Atlassian Confluence Server, allowing attackers to identify internal hosts and ports.
Yes, upgrading to Confluence Server version 7.4.8 or higher will address this vulnerability.