Show plain JSON{"containers": {"cna": {"affected": [{"product": "Confluence Data Center", "vendor": "Atlassian", "versions": [{"lessThan": "unspecified", "status": "affected", "version": "next of 1.3.0", "versionType": "custom"}, {"lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.13.0", "versionType": "custom"}, {"lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom"}, {"lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom"}, {"lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom"}, {"lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom"}, {"lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom"}, {"lessThan": "7.18.1", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "Confluence Server", "vendor": "Atlassian", "versions": [{"lessThan": "unspecified", "status": "affected", "version": "next of 1.3.0", "versionType": "custom"}, {"lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.13.0", "versionType": "custom"}, {"lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom"}, {"lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom"}, {"lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom"}, {"lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom"}, {"lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom"}, {"lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom"}, {"lessThan": "7.18.1", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "datePublic": "2022-05-31T00:00:00.000Z", "descriptions": [{"lang": "en", "value": "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1."}], "problemTypes": [{"descriptions": [{"description": "Remote Code Execution", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2022-06-30T05:20:13.000Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://jira.atlassian.com/browse/CONFSERVER-79016"}, {"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html"}, {"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html"}, {"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html"}, {"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html"}, {"tags": ["x_refsource_MISC"], "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-05-31T20:00:00", "ID": "CVE-2022-26134", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Confluence Data Center", "version": {"version_data": [{"version_affected": ">", "version_value": "1.3.0"}, {"version_affected": "<", "version_value": "7.4.17"}, {"version_affected": ">=", "version_value": "7.13.0"}, {"version_affected": "<", "version_value": "7.13.7"}, {"version_affected": ">=", "version_value": "7.14.0"}, {"version_affected": "<", "version_value": "7.14.3"}, {"version_affected": ">=", "version_value": "7.15.0"}, {"version_affected": "<", "version_value": "7.15.2"}, {"version_affected": ">=", "version_value": "7.16.0"}, {"version_affected": "<", "version_value": "7.16.4"}, {"version_affected": ">=", "version_value": "7.17.0"}, {"version_affected": "<", "version_value": "7.17.4"}, {"version_affected": ">=", "version_value": "7.18.0"}, {"version_affected": "<", "version_value": "7.18.1"}]}}, {"product_name": "Confluence Server", "version": {"version_data": [{"version_affected": ">", "version_value": "1.3.0"}, {"version_affected": "<", "version_value": "7.4.17"}, {"version_affected": ">=", "version_value": "7.13.0"}, {"version_affected": "<", "version_value": "7.13.7"}, {"version_affected": ">=", "version_value": "7.14.0"}, {"version_affected": "<", "version_value": "7.14.3"}, {"version_affected": ">=", "version_value": "7.15.0"}, {"version_affected": "<", "version_value": "7.15.2"}, {"version_affected": ">=", "version_value": "7.16.0"}, {"version_affected": "<", "version_value": "7.16.4"}, {"version_affected": ">=", "version_value": "7.17.0"}, {"version_affected": "<", "version_value": "7.17.4"}, {"version_affected": ">=", "version_value": "7.18.0"}, {"version_affected": "<", "version_value": "7.18.1"}]}}]}, "vendor_name": "Atlassian"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Remote Code Execution"}]}]}, "references": {"reference_data": [{"name": "https://jira.atlassian.com/browse/CONFSERVER-79016", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-79016"}, {"name": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html"}, {"name": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html"}, {"name": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html"}, {"name": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html"}, {"name": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html", "refsource": "MISC", "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T04:56:37.787Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://jira.atlassian.com/browse/CONFSERVER-79016"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html"}]}, {"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-917", "lang": "en", "description": "CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2025-02-04T14:18:48.606174Z", "id": "CVE-2022-26134", "options": [{"Exploitation": "active"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2022-06-02", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2022-26134"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-02-04T14:18:51.802Z"}}]}, "cveMetadata": {"assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-26134", "datePublished": "2022-06-03T21:51:57.134Z", "dateReserved": "2022-02-25T00:00:00.000Z", "dateUpdated": "2025-02-04T14:18:51.802Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}