// For flags

CVE-2019-3396

Atlassian Confluence Server and Data Center Server-Side Template Injection Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

26
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.

La macro de Widget Connector en Atlassian Confluence and Data Center en versiones anteriores a la 6.6.12 (la versión solucionada para 6.6.x), desde la versión 6.7.0 hasta antes de la 6.12.3 (la versión solucionada para 6.12.x), desde la versión 6.13.0 hasta antes de la 6.13.3 (la versión solucionada para 6.13.x) y desde la versión 6.14.0 hasta antes de la 6.14.2 (la versión solucionada para 6.14.x) permite a los atacantes remotos lograr saltos de directorio y ejecución remota de código en una instancia de Confluence Server or Data Center a través de una inyección de plantillas del lado del servidor.

Atlassian Confluence versions 6.6.0 up to 6.6.12, 6.12.0 up to 6.12.3, 6.13.0 up to 6.13.3, and 6.14.0 up to 6.14.2 suffer from a server-side request forgery vulnerability via WebDAV and a remote code execution vulnerability via the Widget Connector macro.

Atlassian Confluence Server and Data Center contain a server-side template injection vulnerability that may allow an attacker to achieve path traversal and remote code execution.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2018-12-19 CVE Reserved
  • 2019-03-25 CVE Published
  • 2019-04-09 First Exploit
  • 2021-11-03 Exploited in Wild
  • 2022-05-03 KEV Due Date
  • 2025-02-07 CVE Updated
  • 2025-03-18 EPSS Updated
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (27)
URL Tag Source
URL Date SRC
https://packetstorm.news/files/id/161065 2021-01-22
https://packetstorm.news/files/id/152568 2019-04-18
https://www.exploit-db.com/exploits/46731 2025-02-07
https://www.exploit-db.com/exploits/49465 2021-01-22
https://github.com/jas502n/CVE-2019-3396 2019-11-01
https://github.com/x-f1v3/CVE-2019-3396 2019-04-09
https://github.com/pyn3rd/CVE-2019-3396 2019-04-10
https://github.com/dothanthitiendiettiende/CVE-2019-3396 2019-04-09
https://github.com/Avento/CVE-2019-3396-Memshell-for-Behinder 2024-05-21
https://github.com/s1xg0d/CVE-2019-3396 2019-05-13
https://github.com/quanpt103/CVE-2019-3396 2019-04-10
https://github.com/xiaoshuier/CVE-2019-3396 2019-04-09
https://github.com/am6539/CVE-2019-3396 2019-11-21
https://github.com/W2Ning/CVE-2019-3396 2019-12-13
https://github.com/skommando/CVE-2019-3396-confluence-poc 2019-08-21
https://github.com/Yt1g3r/CVE-2019-3396_EXP 2024-09-12
https://github.com/vntest11/confluence_CVE-2019-3396 2019-04-28
https://github.com/tanw923/test1 2019-07-02
https://github.com/JonathanZhou348/CVE-2019-3396TEST 2020-02-21
https://github.com/yuehanked/cve-2019-3396 2020-11-17
https://github.com/0xNinjaCyclone/cve-2019-3396 2022-01-10
https://github.com/46o60/CVE-2019-3396_Confluence 2021-02-05
https://github.com/PetrusViet/cve-2019-3396 2024-08-12
http://packetstormsecurity.com/files/152568/Atlassian-Confluence-Widget-Connector-Macro-Velocity-Template-Injection.html 2025-02-07
http://packetstormsecurity.com/files/161065/Atlassian-Confluence-6.12.1-Template-Injection.html 2025-02-07
http://www.rapid7.com/db/modules/exploit/multi/http/confluence_widget_connector 2025-02-07
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Atlassian
Search vendor "Atlassian"
Confluence
Search vendor "Atlassian" for product "Confluence"
< 6.6.12
Search vendor "Atlassian" for product "Confluence" and version " < 6.6.12"
-
Affected
Atlassian
Search vendor "Atlassian"
Confluence
Search vendor "Atlassian" for product "Confluence"
>= 6.7.0 < 6.12.3
Search vendor "Atlassian" for product "Confluence" and version " >= 6.7.0 < 6.12.3"
-
Affected
Atlassian
Search vendor "Atlassian"
Confluence Server
Search vendor "Atlassian" for product "Confluence Server"
>= 6.13.0 < 6.13.3
Search vendor "Atlassian" for product "Confluence Server" and version " >= 6.13.0 < 6.13.3"
-
Affected
Atlassian
Search vendor "Atlassian"
Confluence Server
Search vendor "Atlassian" for product "Confluence Server"
>= 6.14.0 < 6.14.2
Search vendor "Atlassian" for product "Confluence Server" and version " >= 6.14.0 < 6.14.2"
-
Affected