CVE-2024-21686
Atlassian Confluence Stored XSS Vulnerability
Description
This High severity Stored XSS vulnerability was introduced in versions 7.13 of Confluence Data Center and Server. This Stored XSS vulnerability, with a CVSS Score of 7.3, allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives). This vulnerability was reported via our Bug Bounty program.
INFO
Published Date :
July 16, 2024, 8:15 p.m.
Last Modified :
March 19, 2025, 7:15 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
Affected Products
                                            The following products are affected by CVE-2024-21686
                                            vulnerability.
                                            Even if cvefeed.io is aware of the exact versions of the
                                            products
                                            that
                                            are
                                            affected, the information is not represented in the table below.
                                        
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source | 
|---|---|---|---|---|---|---|
| CVSS 3.0 | HIGH | [email protected] | ||||
| CVSS 3.1 | HIGH | [email protected] | 
Solution
- Upgrade to Atlassian Confluence version 7.19.22, 8.5.9, 8.9.1 or later.
References to Advisories, Solutions, and Tools
                                            Here, you will find a curated list of external links that provide in-depth
                                            information, practical solutions, and valuable tools related to
                                            CVE-2024-21686.
                                        
| URL | Resource | 
|---|---|
| https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917 | Vendor Advisory | 
| https://jira.atlassian.com/browse/CONFSERVER-96134 | Issue Tracking | 
| https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917 | Vendor Advisory | 
| https://jira.atlassian.com/browse/CONFSERVER-96134 | Issue Tracking | 
CWE - Common Weakness Enumeration
            While CVE identifies
            specific instances of vulnerabilities, CWE categorizes the common flaws or
            weaknesses that can lead to vulnerabilities. CVE-2024-21686 is
            associated with the following CWEs:
        
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
            (CAPEC)
            stores attack patterns, which are descriptions of the common attributes and
            approaches employed by adversaries to exploit the CVE-2024-21686
            weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
			The following list is the news that have been mention
			CVE-2024-21686 vulnerability anywhere in the article.
		
 
									- 
                                                            
                                                                Cybersecurity News 
CVE-2024-21689: RCE Vulnerability in Atlassian Bamboo Data Center and Server
Atlassian, a global leader in software development tools, has issued a security advisory for its Bamboo Data Center and Server products, highlighting a high-severity Remote Code Execution (RCE) vulner ... Read more
 
									- 
                                                            
                                                                Cybersecurity News 
CVE-2024-5290: Wi-Fi Flaw Leaves Millions Vulnerable to Root Takeover
Security researchers have uncovered a critical vulnerability in wpa_supplicant, a ubiquitous software component responsible for managing Wi-Fi connections on countless devices. The flaw, dubbed CVE-20 ... Read more
 
									- 
                                                            
                                                                Cybersecurity News 
Cisco Warns of Public PoC Exploit Code of Critical CVE-2024-20419 (CVSS 10) Flaw
Cisco has recently updated its security advisory, alerting users to a critical vulnerability identified as CVE-2024-20419. This flaw affects the Cisco Smart Software Manager On-Prem (Cisco SSM On-Prem ... Read more
 
									- 
                                                            
                                                                Cybersecurity News 
Apache CloudStack Releases Critical Patches (CVE-2024-42062 and CVE-2024-42222)
The Apache CloudStack project has issued an urgent security advisory, urging users to update their software immediately to address two critical vulnerabilities, CVE-2024-42062 and CVE-2024-42222. Thes ... Read more
                The following table lists the changes that have been made to the
                CVE-2024-21686 vulnerability over time.
            
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
- 
                            CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0Mar. 19, 2025 Action Type Old Value New Value Added CWE CWE-79 
- 
                            Initial Analysis by [email protected]Feb. 13, 2025 Action Type Old Value New Value Added CVSS V3.1 NIST AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N Added CWE NIST CWE-79 Added CPE Configuration OR *cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* versions up to (excluding) 7.19.22 *cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* versions from (including) 7.20.0 up to (excluding) 8.5.9 *cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:* versions from (including) 8.6.0 up to (excluding) 8.9.1 *cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:* versions up to (excluding) 7.19.22 *cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:* versions from (including) 7.20.0 up to (excluding) 8.5.9 Changed Reference Type https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917 No Types Assigned https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917 Vendor Advisory Changed Reference Type https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917 No Types Assigned https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917 Vendor Advisory Changed Reference Type https://jira.atlassian.com/browse/CONFSERVER-96134 No Types Assigned https://jira.atlassian.com/browse/CONFSERVER-96134 Issue Tracking Changed Reference Type https://jira.atlassian.com/browse/CONFSERVER-96134 No Types Assigned https://jira.atlassian.com/browse/CONFSERVER-96134 Issue Tracking 
- 
                            CVE Modified by af854a3a-2127-422b-91ae-364da2661108Nov. 21, 2024 Action Type Old Value New Value Added Reference https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917 Added Reference https://jira.atlassian.com/browse/CONFSERVER-96134 
- 
                            CVE Received by [email protected]Jul. 16, 2024 Action Type Old Value New Value Added Description This High severity Stored XSS vulnerability was introduced in versions 7.13 of Confluence Data Center and Server. This Stored XSS vulnerability, with a CVSS Score of 7.3, allows an authenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives). This vulnerability was reported via our Bug Bounty program. Added Reference Atlassian https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917 [No types assigned] Added Reference Atlassian https://jira.atlassian.com/browse/CONFSERVER-96134 [No types assigned] Added CVSS V3 Atlassian AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N 
 
                         
                         
                         
                                             
                                            