CVE-2024-21683

HIGH EXPLOITED NUCLEI

Atlassian Confluence Data Center and Server - Remote Code Execution

Title source: nuclei

Description

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.  Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was found internally.

Exploits (8)

nomisec WORKING POC 127 stars
by W01fh4cker · remote-auth
https://github.com/W01fh4cker/CVE-2024-21683-RCE
nomisec WORKING POC 11 stars
by absholi7ly · poc
https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
nomisec WORKING POC 1 stars
by r00t7oo2jm · poc
https://github.com/r00t7oo2jm/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
nomisec WORKING POC 1 stars
by phucrio · remote-auth
https://github.com/phucrio/CVE-2024-21683-RCE
nomisec WORKING POC
by r3db34rdh4x · poc
https://github.com/r3db34rdh4x/cve-2024-21683-rce
metasploit WORKING POC EXCELLENT
by Ankita Sawlani, Huong Kieu, W01fh4cker, remmons-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/atlassian_confluence_rce_cve_2024_21683.rb

Nuclei Templates (1)

Atlassian Confluence Data Center and Server - Remote Code Execution
HIGHVERIFIEDby pdresearch
FOFA: app="ATLASSIAN-Confluence"

Scores

CVSS v3 8.8
EPSS 0.9405
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2024-05-23

Classification

CWE
CWE-94
Status published

Affected Products (19)

atlassian/confluence_data_center < 7.19.24
atlassian/confluence_data_center < 7.20.3
atlassian/confluence_data_center
atlassian/confluence_data_center
atlassian/confluence_data_center
atlassian/confluence_data_center
atlassian/confluence_server < 7.19.24
atlassian/confluence_server < 7.20.3
atlassian/confluence_server
atlassian/confluence_server
atlassian/confluence_server
atlassian/confluence_server
atlassian/fisheye < 4.8.15
atlassian/crucible < 4.8.15
atlassian/jira_data_center < 9.4.21
... and 4 more

Timeline

Published May 21, 2024
Tracked Since Feb 18, 2026