Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-20237

Summary
Assigner-atlassian
Assigner Org ID-f08a6ab8-ed46-4c22-8884-d911ccfe3c66
Published At-13 Feb, 2019 | 18:00
Updated At-16 Sep, 2024 | 21:02
Rejected At-
Credits

Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:atlassian
Assigner Org ID:f08a6ab8-ed46-4c22-8884-d911ccfe3c66
Published At:13 Feb, 2019 | 18:00
Updated At:16 Sep, 2024 | 21:02
Rejected At:
▼CVE Numbering Authority (CNA)

Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.

Affected Products
Vendor
AtlassianAtlassian
Product
Confluence Server
Versions
Affected
  • From unspecified before 6.13.1 (custom)
Vendor
AtlassianAtlassian
Product
Confluence Data Center
Versions
Affected
  • From unspecified before 6.13.1 (custom)
Problem Types
TypeCWE IDDescription
textN/AIndirect Object Reference
Type: text
CWE ID: N/A
Description: Indirect Object Reference
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://jira.atlassian.com/browse/CONFSERVER-57814
x_refsource_CONFIRM
http://www.securityfocus.com/bid/107041
vdb-entry
x_refsource_BID
https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/
x_refsource_MISC
Hyperlink: https://jira.atlassian.com/browse/CONFSERVER-57814
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/107041
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://jira.atlassian.com/browse/CONFSERVER-57814
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/107041
vdb-entry
x_refsource_BID
x_transferred
https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/
x_refsource_MISC
x_transferred
Hyperlink: https://jira.atlassian.com/browse/CONFSERVER-57814
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/107041
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@atlassian.com
Published At:13 Feb, 2019 | 18:29
Updated At:27 Jul, 2022 | 14:08

Atlassian Confluence Server and Data Center before version 6.13.1 allows an authenticated user to download a deleted page via the word export feature.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.04.0MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 4.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:P/I:N/A:N
CPE Matches

Atlassian
atlassian
>>confluence_data_center>>Versions before 6.13.1(exclusive)
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_data_center>>Versions from 6.13.2(inclusive) to 6.14.0(exclusive)
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_server>>Versions before 6.13.1(exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_server>>Versions from 6.13.2(inclusive) to 6.14.0(exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-668Primarynvd@nist.gov
CWE ID: CWE-668
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/107041security@atlassian.com
Third Party Advisory
VDB Entry
https://jira.atlassian.com/browse/CONFSERVER-57814security@atlassian.com
Issue Tracking
Vendor Advisory
https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/security@atlassian.com
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/107041
Source: security@atlassian.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://jira.atlassian.com/browse/CONFSERVER-57814
Source: security@atlassian.com
Resource:
Issue Tracking
Vendor Advisory
Hyperlink: https://www.excellium-services.com/cert-xlm-advisory/cve-2018-20237/
Source: security@atlassian.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

103Records found

CVE-2023-33368
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 37.25%
||
7 Day CHG~0.00%
Published-03 Aug, 2023 | 00:00
Updated-17 Oct, 2024 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some API routes exists in Control ID IDSecure 4.7.26.0 and prior, exfiltrating sensitive information and passwords to users accessing these API routes.

Action-Not Available
Vendor-assaabloyn/a
Product-control_id_idsecuren/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-38599
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 19.89%
||
7 Day CHG~0.00%
Published-08 Dec, 2022 | 00:00
Updated-23 Apr, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Teleport v3.2.2, Teleport v3.5.6-rc6, and Teleport v3.6.3-b2 was discovered to contain an information leak via the /user/get-role-list web interface.

Action-Not Available
Vendor-goteleportn/a
Product-teleportn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-24868
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-4.3||MEDIUM
EPSS-0.21% / 43.29%
||
7 Day CHG~0.00%
Published-01 Feb, 2022 | 12:21
Updated-03 Aug, 2024 | 19:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Document Embedder < 1.7.9 - Subscriber+ Arbitrary Private/Draft Post Title Disclosure

The Document Embedder WordPress plugin before 1.7.9 contains a AJAX action endpoint, which could allow any authenticated user, such as subscriber to enumerate the title of arbitrary private and draft posts.

Action-Not Available
Vendor-bpluginsn/a
Product-document_embeddern/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found