{"id":1327,"date":"2022-06-03T16:47:33","date_gmt":"2022-06-03T12:47:33","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?p=1327"},"modified":"2022-06-03T16:47:33","modified_gmt":"2022-06-03T12:47:33","slug":"zero-day","status":"publish","type":"post","link":"https:\/\/demo.dedote.com\/cyberdisti\/2022\/06\/03\/zero-day\/","title":{"rendered":"Zero Day"},"content":{"rendered":"<h1><span style=\"color: #000080;\">Zero-day Exploited to Target Atlassian Confluence<\/span><\/h1>\n<p><strong><span style=\"color: #ff0000;\">The Severity of the Vulnerability Was Determined as Critical.<\/span><\/strong><\/p>\n<p>A zero-day vulnerability is\u00a0a newly discovered software security flaw that has not yet been patched by the developers and, as a result, can be exploited. The term \u201czero-day\u201d is an imaginative time, as this type of cyberattack happens in a very short timeframe from the awareness of the security flaw.<\/p>\n<h2>What Makes the CVE-2022-26134 Important?<\/h2>\n<p>There is currently no patch available for the newly discovered Atlassian Confluence zero-day vulnerability that is being tracked as CVE-2022-26134.<\/p>\n<p>This vulnerability is being actively exploited by hackers in order to install web shells.<\/p>\n<blockquote><p>Atlassian has been made aware of the current active exploitation of a critical severity unauthenticated remote code execution vulnerability in Confluence Data Center and Server. Further details about the vulnerability are being withheld until a fix is available.<\/p>\n<p>We expect that security fixes for supported versions of Confluence will begin to be available for customer download within 24 hours (estimated time, by EOD June 3 PDT).<\/p><\/blockquote>\n<p><a href=\"https:\/\/confluence.atlassian.com\/doc\/confluence-security-advisory-2022-06-02-1130377146.html\">Source<\/a><\/p>\n<p>Confluence Server and Data Center are both vulnerable to the significant unauthenticated remote code execution flaw identified as CVE-2022-26134, which was disclosed by Atlassian in a security warning.<\/p>\n<p>According to Atlassian, the vulnerability was verified in Confluence Server 7.18.0, and they think that Confluence Server and Data Center 7.4.0 and above are also susceptible to the issue.<\/p>\n<blockquote><p>Atlassian rates the severity level of this vulnerability as\u00a0<strong>critical<\/strong>, according to the scale published in\u00a0<a class=\"external-link\" title=\"https:\/\/www.atlassian.com\/security\/security-severity-levels\" href=\"https:\/\/www.atlassian.com\/security\/security-severity-levels\" rel=\"nofollow\">our Atlassian severity levels<\/a>.\u00a0The scale\u00a0allows us to rank the severity as critical, high, moderate or low.<\/p>\n<p>This is our assessment and you should evaluate its applicability to your own IT environment.<\/p><\/blockquote>\n<p><a href=\"https:\/\/confluence.atlassian.com\/doc\/confluence-security-advisory-2022-06-02-1130377146.html\">Source<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-atlassian-confluence-zero-day-actively-used-in-attacks\/\" rel=\"noopener\">BleepingComputer<\/a>\u00a0reports that an alert has been issued in order to warn users that malicious actors are actively attacking Confluence Server 7.18.0.<\/p>\n<p>Because there are no updates available, Atlassian is advising its customers to make their servers unreachable by one of the following means:<\/p>\n<ul>\n<li>Isolating their Confluence Server and Data Center instances from the internet.<\/li>\n<li>Turning down their Confluence Server and Data Center instances entirely.<\/li>\n<\/ul>\n<p>There is no alternative approach that can be used to protect against this issue.<\/p>\n<p>Organizations that are protected by Atlassian Cloud, which can be accessed via the atlassian.net website, are not vulnerable to this flaw.<\/p>\n<p>Atlassian is hard at work developing a fix, and the company has promised to update its advisory with more details as soon as they are ready.<\/p>\n<p>The vulnerability was discovered by Volexity, a security company that reported the flaw to the company.<\/p>\n<blockquote><p>An initial review of one of the Confluence Server systems quickly identified that a JSP file had been written into a publicly accessible web directory. The file was a well-known copy of the JSP variant of the China Chopper webshell. However, a review of the web logs showed that the file had barely been accessed. The webshell appears to have been written as a means of secondary access.<\/p><\/blockquote>\n<p><a href=\"https:\/\/www.volexity.com\/blog\/2022\/06\/02\/zero-day-exploitation-of-atlassian-confluence\/\" rel=\"noopener\">Source<\/a><\/p>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) has put this zero-day to its \u201cKnown Exploited Vulnerabilities Catalog\u201d and is mandating that all internet communication to Confluence servers be blocked by government entities by tomorrow, June 3rd.<\/p>\n<p>If you liked this article, follow us on\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/heimdal-security\/\"><strong>LinkedIn<\/strong><\/a>,\u00a0<a href=\"https:\/\/twitter.com\/HeimdalSecurity?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\"><strong>Twitter<\/strong><\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/HeimdalSec\/\"><strong>Facebook<\/strong><\/a>,\u00a0<a href=\"https:\/\/www.youtube.com\/c\/Heimdalsecuritycompany\"><strong>Youtube<\/strong><\/a>, and\u00a0<a href=\"https:\/\/www.instagram.com\/heimdalsecurity\/?hl=en\"><strong>Instagram<\/strong><\/a>\u00a0for more cybersecurity news and topics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero-day Exploited to Target Atlassian Confluence The Severity of the Vulnerability Was Determined as Critical. A zero-day vulnerability is\u00a0a newly discovered software security flaw that has not yet been patched&#8230;<\/p>\n","protected":false},"author":1,"featured_media":663,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1327","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/posts\/1327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=1327"}],"version-history":[{"count":1,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/posts\/1327\/revisions"}],"predecessor-version":[{"id":1328,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/posts\/1327\/revisions\/1328"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media\/663"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=1327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/categories?post=1327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/tags?post=1327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}