CVE-2019-15006

Published: Dic 19, 2019 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2019-6093 Aliases: GSD-2019-15006
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,5
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: high
Availability: none
MEDIUM 5,8
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: none

Description

AI Translation Available

There was a man-in-the-middle (MITM) vulnerability present in the Confluence Previews plugin in Confluence Server and Confluence Data Center. This plugin was used to facilitate communication with the Atlassian Companion application. The Confluence Previews plugin in Confluence Server and Confluence Data Center communicated with the Companion application via the atlassian-domain-for-localhost-connections-only.com domain name, the DNS A record of which points at 127.0.0.1. Additionally, a signed certificate for the domain was publicly distributed with the Companion application. An attacker in the position to control DNS resolution of their victim could carry out a man-in-the-middle (MITM) attack between Confluence Server (or Confluence Data Center) and the atlassian-domain-for-localhost-connections-only.com domain intended to be used with the Companion application. This certificate has been revoked, however, usage of the atlassian-domain-for-localhost-connections-only.com domain name was still present in Confluence Server and Confluence Data Center. An attacker could perform the described attack by denying their victim access to certificate revocation information, and carry out a man-in-the-middle (MITM) attack to observe files being edited using the Companion application and/or modify them, and access some limited user information.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0218
Percentile
0,8th
Updated

EPSS Score Trend (Last 90 Days)

913

Improper Control of Dynamically-Managed Code Resources

Incomplete
Common Consequences
Security Scopes Affected:
Integrity Other
Potential Impacts:
Execute Unauthorized Code Or Commands Varies By Context Alter Execution Logic
Applicable Platforms
Languages: Interpreted, Not Language-Specific
View CWE Details
Application

Confluence Server by Atlassian

Version Range Affected
From 6.14.0 (inclusive)
To 6.15.10 (exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Confluence Server by Atlassian

Version Range Affected
From 7.1.0 (inclusive)
To 7.1.2 (exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Confluence Server by Atlassian

Version Range Affected
From 7.0.1 (inclusive)
To 7.0.5 (exclusive)
cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Confluence by Atlassian

Version Range Affected
From 6.11.0 (inclusive)
To 6.13.10 (exclusive)
cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Mid…
https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-98…
https://jira.atlassian.com/browse/CONFSERVER-59244
https://seclists.org/bugtraq/2019/Dec/36
Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Dec/36
https://twitter.com/SwiftOnSecurity/status/1202034106495832067
http://packetstormsecurity.com/files/155742/Atlassian-Confluence-Man-In-The-Mid…
https://confluence.atlassian.com/doc/confluence-security-advisory-2019-12-18-98…
https://jira.atlassian.com/browse/CONFSERVER-59244
https://seclists.org/bugtraq/2019/Dec/36
Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Dec/36
https://twitter.com/SwiftOnSecurity/status/1202034106495832067