Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-22527", "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "state": "PUBLISHED", "assignerShortName": "atlassian", "dateReserved": "2023-01-01T00:01:22.333Z", "datePublished": "2024-01-16T05:00:00.692Z", "dateUpdated": "2025-02-13T16:43:54.355Z"}, "containers": {"cna": {"affected": [{"vendor": "Atlassian", "product": "Confluence Data Center", "versions": [{"version": "< 8.0.0", "status": "unaffected"}, {"version": ">= 8.0.0", "status": "affected"}, {"version": ">= 8.1.0", "status": "affected"}, {"version": ">= 8.2.0", "status": "affected"}, {"version": ">= 8.3.0", "status": "affected"}, {"version": ">= 8.4.0", "status": "affected"}, {"version": ">= 8.5.0", "status": "affected"}, {"version": ">= 8.5.1", "status": "affected"}, {"version": ">= 8.5.2", "status": "affected"}, {"version": ">= 8.5.3", "status": "affected"}, {"version": ">= 8.5.4", "status": "unaffected"}, {"version": ">= 8.6.0", "status": "unaffected"}, {"version": ">= 8.7.1", "status": "unaffected"}]}, {"vendor": "Atlassian", "product": "Confluence Server", "versions": [{"version": "< 8.0.0", "status": "unaffected"}, {"version": ">= 8.0.0", "status": "affected"}, {"version": ">= 8.1.0", "status": "affected"}, {"version": ">= 8.2.0", "status": "affected"}, {"version": ">= 8.3.0", "status": "affected"}, {"version": ">= 8.4.0", "status": "affected"}, {"version": ">= 8.5.0", "status": "affected"}, {"version": ">= 8.5.1", "status": "affected"}, {"version": ">= 8.5.2", "status": "affected"}, {"version": ">= 8.5.3", "status": "affected"}, {"version": ">= 8.5.4", "status": "unaffected"}, {"version": ">= 8.6.0", "status": "unaffected"}]}], "descriptions": [{"lang": "en", "value": "A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian\u2019s January Security Bulletin."}], "problemTypes": [{"descriptions": [{"description": "RCE (Remote Code Execution)", "lang": "en", "type": "RCE (Remote Code Execution)"}]}], "references": [{"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615"}, {"url": "https://jira.atlassian.com/browse/CONFSERVER-93833"}, {"url": "http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html"}], "credits": [{"lang": "en", "value": "Petrus Viet"}], "metrics": [{"cvssV3_0": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "baseScore": 10, "baseSeverity": "CRITICAL"}}], "providerMetadata": {"orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian", "dateUpdated": "2024-01-26T17:06:21.681Z"}}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2023-22527", "role": "CISA Coordinator", "options": [{"Exploitation": "active"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-02-14T05:00:58.661097Z"}}}, {"other": {"type": "kev", "content": {"dateAdded": "2024-01-24", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-22527"}}}], "affected": [{"cpes": ["cpe:2.3:a:atlassian:confluence_data_center:8.0.0:*:*:*:*:*:*:*"], "vendor": "atlassian", "product": "confluence_data_center", "versions": [{"status": "affected", "version": "8.0.0", "lessThan": "8.5.4", "versionType": "custom"}], "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:atlassian:confluence_server:8.0.0:*:*:*:*:*:*:*"], "vendor": "atlassian", "product": "confluence_server", "versions": [{"status": "affected", "version": "8.0.0", "lessThan": "8.5.4", "versionType": "custom"}], "defaultStatus": "unknown"}], "timeline": [{"lang": "en", "time": "2024-01-24T00:00:00+00:00", "value": "CVE-2023-22527 added to CISA KEV"}], "problemTypes": [{"descriptions": [{"lang": "en", "type": "CWE", "cweId": "CWE-74", "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')"}]}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:26:49.981Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-19T07:47:54.708Z"}, "title": "CVE Program Container", "references": [{"url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1333335615", "tags": ["x_transferred"]}, {"url": "https://jira.atlassian.com/browse/CONFSERVER-93833", "tags": ["x_transferred"]}, {"url": "http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html", "tags": ["x_transferred"]}, {"url": "https://www.vicarius.io/vsociety/posts/pwning-confluence-via-ognl-injection-for-fun-and-learning-cve-2023-22527"}]}]}}