Show plain JSON{"containers": {"cna": {"affected": [{"product": "Confluence Server", "vendor": "Atlassian", "versions": [{"lessThan": "6.13.23", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "6.14.0", "versionType": "custom"}, {"lessThan": "7.4.11", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom"}, {"lessThan": "7.11.6", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.12.0", "versionType": "custom"}, {"lessThan": "7.12.5", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "Confluence Data Center", "vendor": "Atlassian", "versions": [{"lessThan": "6.13.23", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "6.14.0", "versionType": "custom"}, {"lessThan": "7.4.11", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom"}, {"lessThan": "7.11.6", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.12.0", "versionType": "custom"}, {"lessThan": "7.12.5", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "datePublic": "2022-02-09T00:00:00", "descriptions": [{"lang": "en", "value": "Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5."}], "problemTypes": [{"descriptions": [{"description": "Remote Code Execution", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2022-04-05T04:00:18", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://jira.atlassian.com/browse/CONFSERVER-68844"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-02-09T00:00:00", "ID": "CVE-2021-39114", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Confluence Server", "version": {"version_data": [{"version_affected": "<", "version_value": "6.13.23"}, {"version_affected": ">=", "version_value": "6.14.0"}, {"version_affected": "<", "version_value": "7.4.11"}, {"version_affected": ">=", "version_value": "7.5.0"}, {"version_affected": "<", "version_value": "7.11.6"}, {"version_affected": ">=", "version_value": "7.12.0"}, {"version_affected": "<", "version_value": "7.12.5"}]}}, {"product_name": "Confluence Data Center", "version": {"version_data": [{"version_affected": "<", "version_value": "6.13.23"}, {"version_affected": ">=", "version_value": "6.14.0"}, {"version_affected": "<", "version_value": "7.4.11"}, {"version_affected": ">=", "version_value": "7.5.0"}, {"version_affected": "<", "version_value": "7.11.6"}, {"version_affected": ">=", "version_value": "7.12.0"}, {"version_affected": "<", "version_value": "7.12.5"}]}}]}, "vendor_name": "Atlassian"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Affected versions of Atlassian Confluence Server and Data Center allow users with a valid account on a Confluence Data Center instance to execute arbitrary Java code or run arbitrary system commands by injecting an OGNL payload. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Remote Code Execution"}]}]}, "references": {"reference_data": [{"name": "https://jira.atlassian.com/browse/CONFSERVER-68844", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-68844"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T01:58:17.751Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://jira.atlassian.com/browse/CONFSERVER-68844"}]}, {"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-94", "lang": "en", "description": "CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}], "affected": [{"vendor": "atlassian", "product": "confluence_data_center", "cpes": ["cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "6.13.23", "versionType": "custom"}, {"version": "6.14.0", "status": "affected", "lessThan": "7.4.11", "versionType": "custom"}, {"version": "7.5.0", "status": "affected", "lessThan": "7.11.6", "versionType": "custom"}, {"version": "7.12.0", "status": "affected", "lessThan": "7.12.5", "versionType": "custom"}]}, {"vendor": "atlassian", "product": "confluence_server", "cpes": ["cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "6.13.23", "versionType": "custom"}, {"version": "6.14.0", "status": "affected", "lessThan": "7.4.11", "versionType": "custom"}, {"version": "7.5.0", "status": "affected", "lessThan": "7.11.6", "versionType": "custom"}, {"version": "7.12.0", "status": "affected", "lessThan": "7.12.5", "versionType": "custom"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-10-04T18:55:58.863918Z", "id": "CVE-2021-39114", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-04T19:06:17.769Z"}}]}, "cveMetadata": {"assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2021-39114", "datePublished": "2022-04-05T04:00:18.966826Z", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-10-04T19:06:17.769Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}