Published: 18/04/2019 Updated: 12/04/2022
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 prior to 6.6.13 (the fixed version for 6.6.x), from 6.7.0 prior to 6.12.4 (the fixed version for 6.12.x), from 6.13.0 prior to 6.13.4 (the fixed version for 6.13.x), from 6.14.0 prior to 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 prior to 6.15.2 are affected by this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian confluence

atlassian confluence server


This Metasploit module exploits an arbitrary file write via path traversal in Atlassian Confluence version 6151 ...
Atlassian Confluence version 6151 suffers from a directory traversal vulnerability ...

Github Repositories

Python script to exploit confluence path traversal vulnerability cve-2019-3398

cve-2019-3398 Details A quick python proof of concept for CVE-2019-3398 confluence vulnerability written in python Confluence version 6123, 6133, 6142, and 6151 are affected The exploit requires working credentials To use Edit the os_username and os_password fields, and possibly the filename path depending on the vulnerable server If the path is set right, shelljsp