Cybersecurity organizations warn {that a} just lately patched vulnerability within the Questions for Confluence utility is already being exploited in assaults.
Questions for Confluence is an utility designed to lend a hand Confluence customers download data, percentage data with others, and to hunt recommend from professionals when essential.
Tracked as CVE-2022-26138 and thought to be ‘important severity’, the problem exists as a result of, when enabled on Confluence Server and Knowledge Heart, the Questions for Confluence utility creates a person account with a hardcoded password.
The account, which has the username ‘disabledsystemuser’, may be added to the confluence-users team, which permits it to get right of entry to non-restricted pages inside Confluence.
Atlassian launched patches for this factor per week in the past, caution that “a faraway, unauthenticated attacker with wisdom of the hardcoded password may just exploit this to log into Confluence and get right of entry to any pages the confluence-users team has get right of entry to to.”
Days after fixes had been rolled out, the corporate up to date its advisory to warn that somebody had made public the hardcoded password, urging organizations to replace their deployments once conceivable.
“This factor might be exploited within the wild now that the hardcoded password is publicly recognized. This vulnerability will have to be remediated on affected methods instantly,” Atlassian mentioned.
Exploitation of CVE-2022-26138 is now underway and it sort of feels that some assault makes an attempt had been noticed even sooner than Atlassian issued its caution.
“Unsurprisingly, it didn’t take lengthy for Rapid7 to watch exploitation as soon as the hardcoded credentials had been launched, given the prime worth of Confluence for attackers who ceaselessly bounce on Confluence vulnerabilities to execute ransomware assaults,” Rapid7 mentioned on Wednesday.
Shadowserver and Gray Noise have additionally noticed in-the-wild exploitation of the safety flaw.
The computer virus affects Questions for Confluence variations 2.7.34, 2.7.35, and three.0.2 and has been resolved with the discharge of variations 2.7.38 (appropriate with Confluence 6.13.18 via 7.16.2) and three.0.5 (appropriate with Confluence 7.16.3 and later).
The patched utility releases additionally take away the ‘disabledsystemuser’ person account if it was once in the past created. Taking away the Questions for Confluence utility with out updating, alternatively, does now not take away the account and customers wish to delete or disable the account manually.
Questions for Confluence has greater than 8,000 installations, in line with Atlassian’s site.
Comparable: Nuki Sensible Lock Vulnerabilities Permit Hackers to Open Doorways
Comparable: Cisco Patches Critical Vulnerabilities in Nexus Dashboard
Comparable: Exploited Vulnerability Patched in WordPress Plugin With Over 1 Million Installations