Questions For Confluence Security Advisory 2022-07-20
Page
- View in Confluence
- Edit Page
Viewport
- Manage Viewport
Confluence
- Dashboard
- Space Directory
- People Directory
Documentation
Unable to load
- Atlassian Support
- Confluence 10.2
- Documentation
- Confluence administrator's guide
- Configuring Confluence Security
- Confluence Security Overview and Advisories
- Questions For Confluence Security Advisory 2022-07-20
Versions
- 10.2
- 10.1
- 10.0
- 9.5
- 9.4
- 9.3
- 9.2
- 9.1
- 9.0
- 8.9
- 8.8
- 8.7
- 8.6
- 8.5
- 8.4
- 8.3
- 8.2
- 8.1
- See all
Confluence Security Overview and Advisories
- Confluence Community Security Advisory 2006-01-19
- Confluence Security Advisory 2005-02-09
- Confluence Security Advisory 2005-12-05
- Confluence Security Advisory 2006-01-20
- Confluence Security Advisory 2006-01-23
- Confluence Security Advisory 2006-06-14
- Confluence Security Advisory 2007-07-26
- Confluence Security Advisory 2007-08-08
- Confluence Security Advisory 2007-11-19
- Confluence Security Advisory 2007-11-27
- Confluence Security Advisory 2007-12-14
- Confluence Security Advisory 2008-01-24
- Confluence Security Advisory 2008-03-06
- Confluence Security Advisory 2008-03-19
- Confluence Security Advisory 2008-05-21
- Confluence Security Advisory 2008-07-03
- Confluence Security Advisory 2008-09-08
- Confluence Security Advisory 2008-10-14
- Confluence Security Advisory 2008-12-03
- Confluence Security Advisory 2009-01-07
- Confluence Security Advisory 2009-02-18
- Confluence Security Advisory 2009-04-15
- Confluence Security Advisory 2009-06-01
- Confluence Security Advisory 2009-06-16
- Confluence Security Advisory 2009-08-20
- Confluence Security Advisory 2009-10-06
- Confluence Security Advisory 2009-12-08
- Confluence Security Advisory 2010-05-04
- Confluence Security Advisory 2010-06-02
- Confluence Security Advisory 2010-07-06
- Confluence Security Advisory 2010-08-17
- Confluence Security Advisory 2010-09-21
- Confluence Security Advisory 2010-10-12
- Confluence Security Advisory 2010-11-15
- Confluence Security Advisory 2011-01-18
- Confluence Security Advisory 2011-03-24
- Confluence Security Advisory 2011-05-31
- Confluence Security Advisory 2012-05-17
- Confluence Security Advisory 2012-09-04
- Confluence Security Advisory 2012-09-11
- Confluence Security Advisory 2013-08-05
- Confluence Security Advisory 2014-02-26
- Confluence Security Advisory 2014-05-21
- Confluence Security Advisory - 2015-01-21
- Confluence Security Advisory - 2016-09-21
- Confluence Security Advisory - 2017-04-19
- Confluence Security Advisory - 2019-03-20
- Confluence Security Advisory - 2019-04-17
- Confluence Security Advisory - 2019-08-28
- Confluence Security Advisory - 2019-12-18
- Confluence Security Advisory - 2021-08-25
- Multiple Products Security Advisory - Unrendered unicode bidirectional override characters - CVE-2021-42574 - 2021-11-01
- Multiple Products Security Advisory - Hazelcast Vulnerable To Remote Code Execution - CVE-2016-10750
- Confluence Security Advisory 2022-06-02
- Questions For Confluence Security Advisory 2022-07-20
On this page
Related content
- No related content found
Still need help?
The Atlassian Community is here for you.
Ask the community
Update: This advisory has been updated since its original publication.
01 Aug 2022 12:00 PM PDT (Pacific Time, -7 hours)
- Updated the Fixes section to note that if the disabledsystemuser account is manually deleted, the app must also be updated or uninstalled to ensure the account does not get recreated
01 Aug 2022 11:00 AM PDT (Pacific Time, -7 hours)
- Updated the Summary of Vulnerability section to note the email service provider for the [email protected] account has confirmed the account has been blocked
30 Jul 2022 12:30 PM PDT (Pacific Time, -7 hours)
- Updated the Summary of Vulnerability and Severity sections to note that instances that have not remediated this vulnerability per the Fixes section may send email notifications from Confluence to a third party email address
- Added a new section How To Look For Evidence of Information Disclosure Via Email
22 Jul 2022 9:30 AM PDT (Pacific Time, -7 hours)
- Updated the Fixes section to explain only option 2 can be used for Confluence Server and Data Center instances configured to use a read-only external directory
22 Jul 2022 9:00 AM PDT (Pacific Time, -7 hours)
- Added a link to a page of frequently asked questions about CVE-2022-26138
21 Jul 2022 8:30 AM PDT (Pacific Time, -7 hours)
- An external party has discovered and publicly disclosed the hardcoded password on Twitter. It is important to remediate this vulnerability on affected systems immediately.
- The Summary of Vulnerability and Severity sections have been updated to include this new information
Summary | Confluence account with hardcoded credentials created by Questions for Confluence |
|---|---|
Advisory Release Date | 20 Jul 2022 10:00 AM PDT (Pacific Time, -7 hours) |
Affected Products | Questions For Confluence app for:
The Questions for Confluence app for Confluence Cloud is not affected. |
CVE ID(s) | CVE-2022-26138 |
When the Questions for Confluence app is enabled on Confluence Server or Data Center, it creates a Confluence user account with the username disabledsystemuser. This account is intended to aid administrators that are migrating data from the app to Confluence Cloud. The disabledsystemuser account is created with a hardcoded password and is added to the confluence-users group, which allows viewing and editing all non-restricted pages within Confluence by default. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access any pages the confluence-users group has access to.
The disabledsystemuser account is configured with a third party email address ([email protected]) that is not controlled by Atlassian. If this vulnerability has not been remediated per the Fixes section below, an affected instance configured to sendnotifications will email that address. One example of an email notification is Recommended Updates Notifications, which contains a report of the top pages from Confluence spaces the user has permissions to view. mail.com, the free email provider that manages the [email protected] account, has confirmed to Atlassian that the account has been blocked. This means it cannot be accessed by anyone unauthorized and cannot send or receive any new messages.
An external party has discovered and publicly disclosed the hardcoded password on Twitter. Refer to the Fixes section below for guidance on how to remediate this vulnerability.
Severity
This vulnerability should be remediated on affected systems immediately for the following reasons:
The hardcoded password is publicly known
- There are reports of this vulnerability being exploited in the wild
Instances where this vulnerability has not been remediated per the Fixes section below may be configured to send email notifications from Confluence to a third party email address that is not controlled by Atlassian
Atlassian rates the severity level of this vulnerability as critical. The scale allows us to rank the severity as critical, high, moderate or low. This is our assessment, and you should evaluate its applicability to your own IT environment.
How To Determine If You Are AffectedA Confluence Server or Data Center instance is affected if it has an active user account with the following information:
User: disabledsystemuser
Username: disabledsystemuser
Email: [email protected]
It is possible for this account to be present if the Questions for Confluence app has previously been installed and uninstalled.
If this account does not show up in the list of active users, the Confluence instance is not affected.
Affected VersionsThese are the versions of the app that create the disabledsystemuser account with a hardcoded password. Confluence installations that do not actively have any of these versions of the app installed may still be affected. Refer to the How To Determine If You Are Affected section above and the Remediation section below for more information.
| Questions for Confluence 2.7.x |
|
| Questions for Confluence 3.0.x |
|
Uninstalling the Questions for Confluence app does not remediate this vulnerability. The disabledsystemuser account does not automatically get removed after the app has been uninstalled. If you have verified a Confluence Server or Data Center instance is affected, two equally effective ways to remediate this vulnerability are listed below.
These options either disable or remove the disabledsystemuser account. Configuring data migration from the app to Confluence Cloud is now a manual process.
Option 1: Update to a non-vulnerable version of Questions for Confluence
Update the Questions for Confluence app to a fixed version:
2.7.x >= 2.7.38 (compatible with Confluence 6.13.18 through 7.16.2)
Versions >= 3.0.5 (compatible with Confluence 7.16.3 and later)
For more information on how to update an app, refer to:
https://confluence.atlassian.com/upm/updating-apps-273875710.html
Fixed versions of the Questions for Confluence app stop creating the disabledsystemuser user account, and remove it from the system if it has already been created.
If Confluence is configured to use a read-only external directory (e.g. Atlassian Crowd), you will need to follow Option 2 below.
Option 2: Disable or delete the disabledsystemuser account
Search for the disabledsystemuser account and either disable it or delete it. For instructions on how to disable or delete an account (including an explanation of the differences between the two options), refer to:
https://confluence.atlassian.com/doc/delete-or-disable-users-138318.html
If you choose to delete the disabledsystemuser account, you must also uninstall or upgrade the Questions for Confluence app to a non-vulnerable version. Failure to do this could result in the account being recreated after it has been deleted.
If Confluence is configured to use a read-only external directory, refer to the Delete from a read-only external directory, or multiple external directories section of the same document:
https://confluence.atlassian.com/doc/delete-or-disable-users-138318.html#DeleteorDisableUsers-Deletefromaread-onlyexternaldirectory,ormultipleexternaldirectories
How To Look For Evidence of ExploitationTo determine if anyone has successfully logged in to the disabledsystemuser account, refer to the following document which provides instructions on how to get a list of users' last logon times:
https://confluence.atlassian.com/confkb/how-to-get-a-list-of-users-with-their-last-logon-times-985499701.html
If the last authentication time for disabledsystemuser is null, that means the account exists but no one has ever logged into it.
How To Look For Evidence of Information Disclosure Via EmailTo determine if Confluence has sent any email notifications to a third party email account, review the logs of the SMTP server configured to send outbound mail from Confluence for any messages sent to the address [email protected]
Frequently Asked QuestionsWe'll update the FAQ for CVE-2022-26138 with answers for commonly asked questions.
Related TicketsCONFSERVER-79483 - Getting issue details... STATUS
If you did not receive an email for this advisory and you wish to receive such emails in the future, go to https://my.atlassian.com/email and subscribe to Alerts emails.
If you have questions or concerns regarding this advisory that aren’t answered in the FAQ, please raise a support request at https://support.atlassian.com/.
ReferencesSecurity Bug fix Policy | As per our new policy, critical security bug fixes will be back ported in accordance with https://www.atlassian.com/trust/security/bug-fix-policy . We will release new maintenance releases for the versions covered by the policy instead of binary patches. Binary patches are no longer released. |
Severity Levels for security issues | Atlassian security advisories include a severity level and a CVE identifier. This severity level is based on our self-calculated CVSS score for each specific vulnerability. CVSS is an industry standard vulnerability metric. You can learn more about CVSS at FIRST.org. |
End of Life Policy | Our end of life policy varies for different products. Please refer to our EOL Policy for details. |
Was this helpful?
Yes No It wasn't accurate It wasn't clear It wasn't relevant Provide feedback about this articleRelated content
- No related content found
Từ khóa » Cn 07
-
Module Cảm Biến Âm Thanh CN07
-
07 - CN 2020 - Nomenklatura Scalona - Klasyfikacje./cn
-
Welcome To NN07® | The Official Home Of No Nationality 07
-
Vỗ Tay Bật đèn Với Cảm Biến âm Thanh CN07
-
[PDF] SCHEDA TECNICA PRODOTTO CN07 - Poste Italiane
-
Full Text: Speech By Xi Jinping At A Ceremony Marking The Centenary ...
-
Henge