Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability

Technology

Atlassian has warned of a critical unpatched remote code execution vulnerability impacting Confluence Server and Data Center products that it said is being actively exploited in the wild.

The Australian software company credited cybersecurity firm Volexity for identifying the flaw, which is being tracked as CVE-2022-26134.

“Atlassian has been made aware of current active exploitation of a critical severity unauthenticated remote code execution vulnerability in Confluence Data Center and Server,” it said in an advisory.

“There are currently no fixed versions of Confluence Server and Data Center available. Atlassian is working with the highest priority to issue a fix.” Specifics of the security flaw have been withheld until a software patch is available.

CyberSecurity

Confluence Server version 7.18.0 is known to have been exploited in the wild, although Confluence Server and Data Center versions 7.4.0 and later are potentially vulnerable.

In the absence of a fix, Atlassian is urging customers to restrict Confluence Server and Data Center instances from the internet or consider disabling Confluence Server and Data Center instances altogether.

Volexity, in an independent disclosure, said it detected the activity over the Memorial Day weekend in the U.S. as part of an incident response investigation.

The attack chain involved leveraging the Atlassian zero-day exploit — a command injection vulnerability — to achieve unauthenticated remote code execution on the server, enabling the threat actor to use the foothold to drop the Behinder web shell.

Behinder provides very powerful capabilities to attackers, including memory-only webshells and built-in support for interaction with Meterpreter and Cobalt Strike,” the researchers said. “At the same time, it does not allow persistence, which means a reboot or service restart will wipe it out.”

CyberSecurity

Subsequently, the web shell is said to have been employed as a conduit to deploy two additional web shells to disk, including China Chopper and a custom file upload shell to exfiltrate arbitrary files to a remote server.

The development comes less than a year after another critical remote code execution flaw in Atlassian Confluence (CVE-2021-26084, CVSS score: 9.8) was actively weaponized in the wild to install cryptocurrency miners on compromised servers.

“By exploiting this kind of vulnerability, attackers can gain direct access to highly sensitive systems and networks,” Volexity said. “Further, these systems can often be difficult to investigate, as they lack the appropriate monitoring or logging capabilities.”

Products You May Like

Articles You May Like

ChatGPT blocked 250,000 image generations of presidential candidates
Sony WF-C510 Review: Best TWS Under Rs 5,000?
Movie Review: ‘Blitz’ | Moviefone
Common Mistakes Nearly All Men Make With Their Bags
Apple Final Cut Pro 11 With New AI-Powered Caption Generation and Spatial Video Editing Released