Security Bulletin - July 18 2023
July 2023 Security Bulletin
It is important to note that the issues included in this bulletin are a recent increase in scope of our disclosures, previously we focused on disclosing first party, critical severity vulnerabilities via critical advisories. While this change results in an increase of visibility and disclosures, it does not mean there are more vulnerabilities. Rather, that we are taking a more proactive approach to vulnerability transparency and are committed to providing our customers with the information they need to make informed decisions about updating our products.
The vulnerabilities reported in this security bulletin include 3 high severity vulnerabilities which have been fixed in new versions of our products, released in the last month. These vulnerabilities are discovered via our bug bounty and pen-testing processes, as well as 3rd party library scans.
Released Security Vulnerabilities | ||||||
---|---|---|---|---|---|---|
Summary | Severity | CVSS Score | Affected Versions | CVE ID | More Details | Public Date |
RCE (Remote Code Execution) in Confluence Data Center & Server | High | 8 | >= 8.0.0 | CVE-2023-22505 | CONFSERVER-88265 | Jul 18, 2023 |
RCE (Remote Code Execution) in Confluence Data Center & Server | High | 8.5 | >= 6.1.0 | CVE-2023-22508 | CONFSERVER-88221 | Jul 18, 2023 |
Injection, RCE (Remote Code Execution) in Bamboo | High | 7.5 | >= 8.0.0 | CVE-2023-22506 | BAM-22400 | Jul 18, 2023 |
What you need to do
To fix all the vulnerabilities in this bulletin, Atlassian recommends upgrading your instances to the latest version, if you're unable to do so, upgrade to the minimum fix version in the table below.
Product | Fix Recommendation |
---|---|
Bamboo Server and Data Center | Upgrade to a minimum fix version of 9.2.3, 9.3.1 or latest |
Confluence Server and Data Center | Upgrade to a minimum fix version of 8.3.2, 8.4.0 or latest |