Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-22518

Summary
Assigner-atlassian
Assigner Org ID-f08a6ab8-ed46-4c22-8884-d911ccfe3c66
Published At-31 Oct, 2023 | 14:30
Updated At-30 Jul, 2025 | 01:37
Rejected At-
Credits

Atlassian Confluence Data Center and Server Improper Authorization Vulnerability

Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Known Exploited Vulnerabilities (KEV)
cisa.gov
Vendor:
AtlassianAtlassian
Product:Confluence Data Center and Server
Added At:07 Nov, 2023
Due At:28 Nov, 2023

Atlassian Confluence Data Center and Server Improper Authorization Vulnerability

Atlassian Confluence Data Center and Server contain an improper authorization vulnerability that can result in significant data loss when exploited by an unauthenticated attacker. There is no impact on confidentiality since the attacker cannot exfiltrate any data.

Used in Ransomware

:

Known

CWE

:
CWE-863

Required Action:

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Additional Notes:

https://confluence.atlassian.com/security/cve-2023-22518-improper-authorization-vulnerability-in-confluence-data-center-and-server-1311473907.html; https://nvd.nist.gov/vuln/detail/CVE-2023-22518
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:atlassian
Assigner Org ID:f08a6ab8-ed46-4c22-8884-d911ccfe3c66
Published At:31 Oct, 2023 | 14:30
Updated At:30 Jul, 2025 | 01:37
Rejected At:
▼CVE Numbering Authority (CNA)

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Affected Products
Vendor
AtlassianAtlassian
Product
Confluence Data Center
Versions
Affected
  • >= 1.0.0
Unaffected
  • < 1.0.0
  • >= 7.19.16
  • >= 8.3.4
  • >= 8.4.4
  • >= 8.5.3
  • >= 8.6.1
Vendor
AtlassianAtlassian
Product
Confluence Server
Versions
Affected
  • >= 1.0.0
Unaffected
  • < 1.0.0
  • >= 7.19.16
  • >= 8.3.4
  • >= 8.4.4
  • >= 8.5.3
  • >= 8.6.1
Problem Types
TypeCWE IDDescription
Improper AuthorizationN/AImproper Authorization
Type: Improper Authorization
CWE ID: N/A
Description: Improper Authorization
Metrics
VersionBase scoreBase severityVector
3.010.0CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Version: 3.0
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

-
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
N/A
https://jira.atlassian.com/browse/CONFSERVER-93142
N/A
http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
N/A
Hyperlink: https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
Resource: N/A
Hyperlink: https://jira.atlassian.com/browse/CONFSERVER-93142
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
x_transferred
https://jira.atlassian.com/browse/CONFSERVER-93142
x_transferred
http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
x_transferred
Hyperlink: https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
Resource:
x_transferred
Hyperlink: https://jira.atlassian.com/browse/CONFSERVER-93142
Resource:
x_transferred
Hyperlink: http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-863CWE-863 Incorrect Authorization
Type: CWE
CWE ID: CWE-863
Description: CWE-863 Incorrect Authorization
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
kev
dateAdded:
2023-11-07
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-22518
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2023-22518 added to CISA KEV2023-11-07 00:00:00
Event: CVE-2023-22518 added to CISA KEV
Date: 2023-11-07 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@atlassian.com
Published At:31 Oct, 2023 | 15:15
Updated At:10 Feb, 2025 | 17:57

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2023-11-072023-11-28Atlassian Confluence Data Center and Server Improper Authorization VulnerabilityApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Date Added: 2023-11-07
Due Date: 2023-11-28
Vulnerability Name: Atlassian Confluence Data Center and Server Improper Authorization Vulnerability
Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.010.0CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.0
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CPE Matches

Atlassian
atlassian
>>confluence_data_center>>Versions from 1.0(inclusive) to 7.19.16(exclusive)
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_data_center>>Versions from 7.20.0(inclusive) to 8.3.4(exclusive)
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_data_center>>Versions from 8.4.0(inclusive) to 8.4.4(exclusive)
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_data_center>>Versions from 8.5.0(inclusive) to 8.5.3(exclusive)
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_data_center>>8.6.0
cpe:2.3:a:atlassian:confluence_data_center:8.6.0:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_server>>Versions from 1.0(inclusive) to 7.19.16(exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_server>>Versions from 7.20.0(inclusive) to 8.3.4(exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_server>>Versions from 8.4.0(inclusive) to 8.4.4(exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_server>>Versions from 8.5.0(inclusive) to 8.5.3(exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Atlassian
atlassian
>>confluence_server>>8.6.0
cpe:2.3:a:atlassian:confluence_server:8.6.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-863Primarynvd@nist.gov
CWE-863Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-863
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-863
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.htmlsecurity@atlassian.com
Exploit
Third Party Advisory
VDB Entry
https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907security@atlassian.com
Issue Tracking
Mitigation
Vendor Advisory
https://jira.atlassian.com/browse/CONFSERVER-93142security@atlassian.com
Issue Tracking
Mitigation
Vendor Advisory
http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mitigation
Vendor Advisory
https://jira.atlassian.com/browse/CONFSERVER-93142af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mitigation
Vendor Advisory
Hyperlink: http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
Source: security@atlassian.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
Source: security@atlassian.com
Resource:
Issue Tracking
Mitigation
Vendor Advisory
Hyperlink: https://jira.atlassian.com/browse/CONFSERVER-93142
Source: security@atlassian.com
Resource:
Issue Tracking
Mitigation
Vendor Advisory
Hyperlink: http://packetstormsecurity.com/files/176264/Atlassian-Confluence-Improper-Authorization-Code-Execution.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mitigation
Vendor Advisory
Hyperlink: https://jira.atlassian.com/browse/CONFSERVER-93142
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mitigation
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

206Records found

CVE-2020-21124
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.74% / 72.05%
||
7 Day CHG~0.00%
Published-15 Sep, 2021 | 16:16
Updated-04 Aug, 2024 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UReport 2.2.9 allows attackers to execute arbitrary code due to a lack of access control to the designer page.

Action-Not Available
Vendor-ureport_projectn/a
Product-ureportn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-7108
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-8.2||HIGH
EPSS-0.09% / 27.11%
||
7 Day CHG~0.00%
Published-26 Sep, 2024 | 12:07
Updated-03 Oct, 2024 | 00:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in National Keep's CyberMath

Incorrect Authorization vulnerability in National Keep Cyber Security Services CyberMath allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects CyberMath: before CYBM.240816253.

Action-Not Available
Vendor-nationalkeepNational Keep Cyber Security Services
Product-cybermathCyberMath
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-42473
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.12%
||
7 Day CHG~0.00%
Published-09 Aug, 2024 | 21:16
Updated-01 Oct, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenFGA Authorization Bypass

OpenFGA is an authorization/permission engine. OpenFGA v1.5.7 and v1.5.8 are vulnerable to authorization bypass when calling Check API with a model that uses `but not` and `from` expressions and a userset. Users should downgrade to v1.5.6 as soon as possible. This downgrade is backward compatible. As of time of publication, a patch is not available but OpenFGA's maintainers are planning a patch for inclusion in a future release.

Action-Not Available
Vendor-openfgaopenfgaopenfga
Product-openfgaopenfgaopenfga
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-20149
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.71% / 71.22%
||
7 Day CHG~0.00%
Published-30 Dec, 2021 | 21:31
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient access controls for the WAN interface. The default iptables ruleset for governing access to services on the device only apply to IPv4. All services running on the devices are accessible via the WAN interface via IPv6 by default.

Action-Not Available
Vendor-n/aTRENDnet, Inc.
Product-tew-827dru_firmwaretew-827druTrendnet AC2600 TEW-827DRU
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-8212
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 65.23%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 15:40
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in Citrix XenMobile Server 10.12 before RP3, Citrix XenMobile Server 10.11 before RP6, Citrix XenMobile Server 10.10 RP6 and Citrix XenMobile Server before 10.9 RP5 allows access to privileged functionality.

Action-Not Available
Vendor-n/aCitrix (Cloud Software Group, Inc.)
Product-xenmobile_serverCitrix XenMobile Server
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-36994
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 25.56%
||
7 Day CHG~0.00%
Published-07 Jul, 2023 | 00:00
Updated-13 Nov, 2024 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TravianZ 8.3.4 and 8.3.3, Incorrect Access Control in the installation script allows an attacker to overwrite the server configuration and inject PHP code.

Action-Not Available
Vendor-travianz_projectn/a
Product-travianzn/a
CWE ID-CWE-863
Incorrect Authorization
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found