• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers exploiting unpatched critical atlassian confluence zero day vulnerability

Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability

You are here: Home / General Cyber Security News / Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability
June 3, 2022

Atlassian has warned of a critical unpatched distant code execution vulnerability impacting Confluence Server and Data Centre products that it said is becoming actively exploited in the wild.

The Australian program company credited cybersecurity firm Volexity for pinpointing the flaw, which is getting tracked as CVE-2022-26134.

“Atlassian has been built informed of present lively exploitation of a critical severity unauthenticated remote code execution vulnerability in Confluence Info Middle and Server,” it explained in an advisory.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“There are at the moment no mounted versions of Confluence Server and Details Centre obtainable. Atlassian is functioning with the greatest precedence to issue a resolve.” Specifics of the security flaw have been withheld until eventually a software package patch is offered.

CyberSecurity

Confluence Server variation 7.18. is regarded to have been exploited in the wild, while Confluence Server and Knowledge Heart versions 7.4. and later on are probably susceptible.

In the absence of a repair, Atlassian is urging shoppers to prohibit Confluence Server and Data Middle circumstances from the internet or take into consideration disabling Confluence Server and Facts Centre situations altogether.

Volexity, in an impartial disclosure, explained it detected the action more than the Memorial Working day weekend in the U.S. as part of an incident reaction investigation.

The attack chain associated leveraging the Atlassian zero-working day exploit — a command injection vulnerability — to reach unauthenticated distant code execution on the server, enabling the threat actor to use the foothold to drop the Behinder web shell.

“Behinder supplies really powerful abilities to attackers, which includes memory-only webshells and constructed-in assist for conversation with Meterpreter and Cobalt Strike,” the researchers claimed. “At the identical time, it does not let persistence, which suggests a reboot or assistance restart will wipe it out.”

CyberSecurity

Subsequently, the web shell is claimed to have been employed as a conduit to deploy two further web shells to disk, such as China Chopper and a custom file add shell to exfiltrate arbitrary data files to a distant server.

The progress arrives significantly less than a calendar year soon after a different critical remote code execution flaw in Atlassian Confluence (CVE-2021-26084, CVSS score: 9.8) was actively weaponized in the wild to set up cryptocurrency miners on compromised servers.

“By exploiting this type of vulnerability, attackers can attain immediate entry to very delicate programs and networks,” Volexity said. “Further more, these units can frequently be tough to investigate, as they absence the suitable checking or logging abilities.”

Discovered this post fascinating? Abide by THN on Facebook, Twitter  and LinkedIn to read through much more exceptional information we publish.


Some areas of this report are sourced from:
thehackernews.com

Previous Post: «threat detection software: a deep dive Threat Detection Software: A Deep Dive
Next Post: Microsoft Blocks Iran-linked Lebanese Hackers Targeting Israeli Companies microsoft blocks iran linked lebanese hackers targeting israeli companies»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.