Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
                
            References
                    | Link | Resource | 
|---|---|
| https://jira.atlassian.com/browse/CONFSERVER-68844 | Issue Tracking Third Party Advisory | 
| https://jira.atlassian.com/browse/CONFSERVER-68844 | Issue Tracking Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 06:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://jira.atlassian.com/browse/CONFSERVER-68844 - Issue Tracking, Third Party Advisory | 
Information
                Published : 2022-04-05 04:15
Updated : 2024-11-21 06:18
NVD link : CVE-2021-39114
Mitre link : CVE-2021-39114
CVE.ORG link : CVE-2021-39114
JSON object : View
Products Affected
                atlassian
- confluence_data_center
- confluence_server
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
