Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.
  • Residence:
  • County:
  • Country:
Cyber Security Incident Response
Management & Architecture of Cyber Security Teams
Solutions & Coaching
  • Cyber Security Incident Response
  • Management & Architecture of Cyber Security Teams
  • Solutions
  • Training & Coaching

U.S. Cyber Command Warns of Ongoing Attacks Exploiting Atlassian Confluence Flaw

September 4, 2021
atlassian confluence

The U.S. Cyber Command on Friday warned of ongoing mass exploitation makes an attempt within the wild concentrating on a now-patched important safety vulnerability affecting Atlassian Confluence deployments that could possibly be abused by unauthenticated attackers to take management of a susceptible system.

“Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and anticipated to speed up,” the Cyber Nationwide Mission Pressure (CNMF) said in a tweet. The warning was additionally echoed by the U.S. Cybersecurity and Infrastructure Safety Company (CISA) and Atlassian itself in a collection of impartial advisories.

Unhealthy Packets noted on Twitter it “detected mass scanning and exploit exercise from hosts in Brazil, China, Hong Kong, Nepal, Romania, Russia and the U.S. concentrating on Atlassian Confluence servers susceptible to distant code execution.”

Atlassian Confluence is a broadly fashionable web-based documentation platform that enables groups to create, collaborate, and set up on completely different tasks, providing a typical platform to share data in company environments. It counts a number of main corporations, together with Audi, Docker, GoPro, Hubspot, LinkedIn, Morningstar, NASA, The New York Occasions, and Twilio, amongst its prospects.

The development comes days after the Australian firm rolled out safety updates on August 25 for a OGNL (Object-Graph Navigation Language) injection flaw that, in particular cases, could possibly be exploited to execute arbitrary code on a Confluence Server or Information Heart occasion.

Put in another way, an adversary can leverage this weak point to execute any command with the identical permissions because the person working the service, and worse, abuse the entry to realize elevated administrative permissions to stage additional assaults in opposition to the host utilizing unpatched native vulnerabilities.

The flaw, which has been assigned the identifier CVE-2021-26084 and has a severity score of 9.8 out of 10 on the CVSS scoring system, impacts all variations prior to six.13.23, from model 6.14.0 earlier than 7.4.11, from model 7.5.0 earlier than 7.11.6, and from model 7.12.0 earlier than 7.12.5.

The difficulty has been addressed within the following variations —

  • 6.13.23
  • 7.4.11
  • 7.11.6
  • 7.12.5
  • 7.13.0

Within the days for the reason that patches have been issued, a number of risk actors have seized the chance to capitalize on the flaw by ensnaring potential victims to mass scan susceptible Confluence servers and install crypto miners after a proof-of-concept (PoC) exploit was publicly released earlier this week. Rahul Maini, one of many researchers concerned, described the method of growing the CVE-2021-26084 exploit as “comparatively less complicated than anticipated.”

Posted in SecurityTags:
Write a comment