CVE-2023-22512

This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6.0 of Confluence Data Center and Server. With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact to confidentiality, no impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14 Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1 Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ]). This vulnerability was reported via our Bug Bounty program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*

History

30 Apr 2025, 13:34

Type Values Removed Values Added
First Time Atlassian confluence Data Center
Atlassian confluence Server
Atlassian
References () https://confluence.atlassian.com/pages/viewpage.action?pageId=1283691616 - () https://confluence.atlassian.com/pages/viewpage.action?pageId=1283691616 - Vendor Advisory
References () https://jira.atlassian.com/browse/CONFSERVER-91258 - () https://jira.atlassian.com/browse/CONFSERVER-91258 - Issue Tracking, Vendor Advisory
CPE cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*
Summary
  • (es) Esta vulnerabilidad de denegación de servicio (DoS) de alta gravedad se introdujo en la versión 5.6.0 de Confluence Data Center and Server. Con una puntuación CVSS de 7,5, permite a un atacante no autenticado provocar la indisponibilidad de un recurso para sus usuarios previstos mediante la interrupción temporal o indefinida de los servicios de un host vulnerable (instancia de Confluence) conectado a una red. Esto no afecta a la confidencialidad ni a la integridad, tiene un alto impacto en la disponibilidad y no requiere la interacción del usuario. Atlassian recomienda que los clientes de Confluence Data Center y Server actualicen a la última versión. Si no pueden hacerlo, actualicen su instancia a una de las versiones corregidas compatibles especificadas: Confluence Data Center y Server 7.19: actualice a una versión mayor o igual a la 7.19.14 Confluence Data Center y Server 8.5: actualice a una versión mayor o igual a la 8.5.1 Confluence Data Center y Server 8.6 o posterior: no es necesario actualizar, ya tienen una versión parcheada Consulte las notas de la versión (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). Puede descargar la última versión de Confluence Data Center y Server desde el centro de descargas (https://www.atlassian.com/software/confluence/download-archives ]). Esta vulnerabilidad se informó a través de nuestro programa Bug Bounty.
CWE NVD-CWE-noinfo

17 Mar 2025, 23:15

Type Values Removed Values Added
Summary (en) Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. (en) This High severity DoS (Denial of Service) vulnerability was introduced in version 5.6.0 of Confluence Data Center and Server. With a CVSS Score of 7.5, this vulnerability allows an unauthenticated attacker to cause a resource to be unavailable for its intended users by temporarily or indefinitely disrupting services of a vulnerable host (Confluence instance) connected to a network, which has no impact to confidentiality, no impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.14 Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.1 Confluence Data Center and Server 8.6 or above: No need to upgrade, you're already on a patched version See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ]). This vulnerability was reported via our Bug Bounty program.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References
  • () https://confluence.atlassian.com/pages/viewpage.action?pageId=1283691616 -
  • () https://jira.atlassian.com/browse/CONFSERVER-91258 -

16 Jan 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 18:15

Updated : 2025-04-30 13:34


NVD link : CVE-2023-22512

Mitre link : CVE-2023-22512

CVE.ORG link : CVE-2023-22512


JSON object : View

Products Affected

atlassian

  • confluence_data_center
  • confluence_server