CVE-2022-26138

The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group...

Basic Information

CVE State
PUBLISHED
Reserved Date
February 25, 2022
Published Date
July 20, 2022
Last Updated
January 28, 2025
Vendor
Atlassian
Product
Questions For Confluence
Description
The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2022-07-29 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2022-07-28 09:48:21 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-07-29 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

z92g/CVE-2022-26138

Type: github • Created: 2022-07-30 07:14:52 UTC • Stars: 15

Confluence Hardcoded Password POC

Vulnmachines/Confluence-Question-CVE-2022-26138-

Type: github • Created: 2022-07-28 09:48:21 UTC • Stars: 3

Atlassian Confluence Server and Data Center: CVE-2022-26138

alcaparra/CVE-2022-26138

Type: github • Created: 2022-07-21 09:28:06 UTC • Stars: 31

Atlassian Questions Hardcoded Password (CVE-2022-26138)