First published: Mon Aug 30 2021(Updated: )
Atlassian Confluence Server and Data Server contain an Object-Graph Navigation Language (OGNL) injection vulnerability that may allow an unauthenticated attacker to execute code.
Credit: security@atlassian.com security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Confluence Data Center | <6.13.23 | |
Atlassian Confluence Data Center | >=6.14.0<7.4.11 | |
Atlassian Confluence Data Center | >=7.5.0<7.11.6 | |
Atlassian Confluence Data Center | >=7.12.0<7.12.5 | |
Atlassian Confluence Server | <6.13.23 | |
Atlassian Confluence Server | >=6.14.0<7.4.11 | |
Atlassian Confluence Server | >=7.5.0<7.11.6 | |
Atlassian Confluence Server | >=7.12.0<7.12.5 | |
Atlassian Confluence Server and Data Center | ||
<6.13.23 | ||
>=6.14.0<7.4.11 | ||
>=7.5.0<7.11.6 | ||
>=7.12.0<7.12.5 | ||
<6.13.23 | ||
>=6.14.0<7.4.11 | ||
>=7.5.0<7.11.6 | ||
>=7.12.0<7.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26084 is a vulnerability in Atlassian Confluence Server and Data Center that allows an unauthenticated attacker to execute arbitrary code.
CVE-2021-26084 has a severity score of 9.8, which is considered critical.
Versions before 6.13.23 and from 6.14.0 to 7.4.11 of Confluence Server and Data Center are affected by CVE-2021-26084.
An attacker can exploit CVE-2021-26084 by injecting malicious Object-Graph Navigation Language (OGNL) code.
Yes, updating Confluence Server and Data Center to version 7.4.11 or later will fix the vulnerability.