Daily Tech News, Interviews, Reviews and Updates

Atlassian introduces fixes for Critical Confluence Vulnerability

Atlassians have presented remedies for a security vulnerability pertaining to the use of hard-coded credentials that affected the Questions For Confluence app for Confluence Server and Confluence Data Center. 

The flaw was tracked as CVE-2022-26138. This flaw arises when the app in question is enabled on either of the two services. This caused it to create a Confluence user account with the username “disabledsystemuser”. 

Atlassians states that this app is to help administrators migrate date from the app to the Confluence Cloud. Along with it, it also creates a hard coded password that allows viewing and editing all non-restricted pages within Confluence by default.

The Company asserted that a remote, unauthenticated attacked with knowledge of the hard-coded password can exploit this to log into Confluence. They can then access any pages the confluence-users group has access. The also added that the hard-coded password is trivial to obtain after downloading and reviewing affected versions of the app.

The flaw impacted versions 2.7.34, 2.7.35 and 3.0.2 of the Questions for Confluence app. The fixes are available in the new versions, version 2.7.38 and 3.0.5. The users can also disable or delete the disabled system user account.

Atlassian also mentioned that users can look for indicators of exploitation by checking the last authentication time for the account. In a scenario when the last authentication time for disabledsystemuser is null, it means that the account exists but no one has ever logged into it. 

 



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More