First published: Wed Jul 01 2020(Updated: )
Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Confluence | <7.4.5 | |
Atlassian Confluence Server | >=7.5.0<7.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-4027.
The title of this vulnerability is 'Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros'.
The severity of CVE-2020-4027 is medium, with a severity value of 4.7.
Versions of Atlassian Confluence before 7.4.5 and from 7.5.0 to 7.5.1 are affected by CVE-2020-4027.
Remote attackers with system administration permissions can exploit the injection vulnerability in custom user macros to bypass velocity template injection mitigations.