First published: Thu Feb 18 2021(Updated: )
The ConfluenceResourceDownloadRewriteRule class in Confluence Server and Confluence Data Center before version 6.13.18, from 6.14.0 before 7.4.6, and from 7.5.0 before 7.8.3 allowed unauthenticated remote attackers to read arbitrary files within WEB-INF and META-INF directories via an incorrect path access check.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Confluence Data Center | <6.13.18 | |
Atlassian Confluence Data Center | >=6.14.0<7.4.6 | |
Atlassian Confluence Data Center | >=7.5.0<7.8.3 | |
Atlassian Confluence Server | <6.13.18 | |
Atlassian Confluence Server | >=6.14.0<7.4.6 | |
Atlassian Confluence Server | >=7.5.0<7.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29448 is a vulnerability in Confluence Server and Confluence Data Center that allows unauthenticated remote attackers to read arbitrary files within the WEB-INF and META-INF directories.
The severity of CVE-2020-29448 is medium with a CVSS score of 5.3.
Confluence Server versions up to 6.13.18, 6.14.0 up to 7.4.6, and 7.5.0 up to 7.8.3, as well as Confluence Data Center versions up to 6.13.18, 6.14.0 up to 7.4.6, and 7.5.0 up to 7.8.3 are affected by CVE-2020-29448.
An attacker can exploit CVE-2020-29448 by sending a specially crafted request to the affected Confluence Server or Confluence Data Center, allowing them to read arbitrary files on the server.
Yes, Atlassian has released patches to fix CVE-2020-29448. It is recommended to upgrade to Confluence Server and Confluence Data Center versions 6.13.18, 7.4.6, or 7.8.3 or later.