TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

US Cybercom says mass exploitation of Atlassian Confluence vulnerability ongoing

692 pointsby daniaalover 3 years ago

25 comments

numairover 3 years ago
The good thing about the fact that Atlassian offers both on-prem and cloud versions of their offerings is, everyone is now aware of the awful engineering practices that underpin their products. We have to assume that there are problems of a similar nature in their cloud service, which is <i>way</i> more of a problem considering the number of orgs that depend on the JIRA SaaS offering.<p>Maybe the founders could have used some of that time spent planning a tunnel between their side-by-side $100M houses, or engaged in Twitter rants, to actually bother delivering value to customers. It’s only a matter of time before this product suite is disrupted, and it might represent one of the most obvious low-hanging opportunities in our entire industry.<p>I still remember being in line at a WWDC a few years back, overhearing someone ask a developer, “where do you work?” When the developer responded with “HipChat,” the other person immediately chuckled and said, “oh — <i>Atlassian</i>... I’m sorry” — and then everyone around them also started laughing. It’s amazing that this company continues to fall up, and that the founders have taken on roles as the ruling digital gurus of Australia (shows you why it’s so easy for the government to run circles around the local tech industry and pass whatever laws they want).
评论 #28434107 未加载
评论 #28436418 未加载
评论 #28433055 未加载
评论 #28434448 未加载
评论 #28437458 未加载
评论 #28433167 未加载
评论 #28433705 未加载
评论 #28439045 未加载
评论 #28437259 未加载
评论 #28443707 未加载
评论 #28438357 未加载
评论 #28437805 未加载
评论 #28439969 未加载
评论 #28437637 未加载
评论 #28433202 未加载
daniaalover 3 years ago
Twitter link to a case of the vulnerability being exploited: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;th3_protoCOL&#x2F;status&#x2F;1433414685299142660" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;th3_protoCOL&#x2F;status&#x2F;1433414685299142660</a><p>NIST Link to issue: <a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2021-26084" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2021-26084</a><p>Tweet from USCYBERCOM urging users to patch: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;CNMF_CyberAlert&#x2F;status&#x2F;1433787671785185283" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;CNMF_CyberAlert&#x2F;status&#x2F;14337876717851852...</a><p>Tweet from BadPackets showing where the bad actors are originating from: <a href="https:&#x2F;&#x2F;twitter.com&#x2F;bad_packets&#x2F;status&#x2F;1433157632370511873" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;bad_packets&#x2F;status&#x2F;1433157632370511873</a>
评论 #28432702 未加载
评论 #28434604 未加载
miken123over 3 years ago
Atlassian was so kind to update their mailing lists somewhere over the last year or so. Previously, they would email the &#x27;technical contact&#x27; of the license about any vulnerabilities. They quietly switched to some other notification system and never informed us about it. Hence we missed the update and got a free Bitcoin miner. Thanks Atlassian, I&#x27;ll make sure to get your products out of the door as soon as possible.<p>[edit] Oh it&#x27;s even better. Their site says &#x27;Note: if you are a tech administrator, you will always receive these notifications.&#x27; but they never mailed us. Great job, Atlassian, great job.
评论 #28434955 未加载
评论 #28432820 未加载
评论 #28432571 未加载
评论 #28433602 未加载
评论 #28436964 未加载
评论 #28432925 未加载
dijitover 3 years ago
&gt; The vulnerability only affects on-premise servers, not those hosted in the cloud.<p>This is a dangerous statement to make and should be revised to say:<p>&gt; The vulnerability only affects standalone versions of the software, not the managed service of confluence provided directly by Atlassian.<p>The problem with the former is that lesser technical people, especially directors, might assume they&#x27;re fine because their standalone instances are hosted on GCP&#x2F;AWS&#x2F;Azure, which counts to them as &quot;cloud&quot;.
评论 #28433740 未加载
评论 #28436543 未加载
评论 #28436949 未加载
rbanffyover 3 years ago
I hope they can find what they are looking for, because, with the built-in search, I sure can’t.
评论 #28434014 未加载
评论 #28434553 未加载
LilBytesover 3 years ago
A colleague who runs security at an ASX 200 company found crypto mining running within a day of the vulnerability being announced. They&#x27;ve since patched and cleaned up the hosts they run Data Centre on. Patch quickly, and check for the IoCs listed in Daniaal&#x27;s tweet below.
bhauerover 3 years ago
Admittedly low-value comment: Can we appreciate the amazing vulnerability name? Confluenza.<p><a href="https:&#x2F;&#x2F;censys.io&#x2F;blog&#x2F;cve-2021-26084-confluenza&#x2F;" rel="nofollow">https:&#x2F;&#x2F;censys.io&#x2F;blog&#x2F;cve-2021-26084-confluenza&#x2F;</a>
评论 #28439302 未加载
评论 #28437640 未加载
评论 #28436908 未加载
dwildover 3 years ago
&gt; An OGNL injection vulnerability exists that would allow an authenticated user, and in some instances unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance.<p>For god sake, can we all agree to stop using OGNL at this point? At my previous job I kept having to fix OGNL vulnerabilities on our stack, it was awful.<p>Don&#x27;t remember Apple developer portal hack? OGNL<p>What about Equifax? OGNL<p>This thing is so freakingly insecure it&#x27;s crazy.
wcchandlerover 3 years ago
My employer was bit by this on Wednesday. Thankfully we had Crowdstrike on it which blocked any real damage. But it definitely moved our cloud migration from “later this year” to “later this month”.<p>Also, not having confluence for a day exposed just how reliant we were on it for day-to-day activities.
评论 #28432363 未加载
评论 #28432745 未加载
评论 #28433769 未加载
echelonover 3 years ago
I am not in the least bit shocked.<p>Atlassian products are some of the worst glued-together garbage in the industry. The entire product surface area is probably rife with exploits.<p>Using Confluence or Jira will show you just how much Atlassian cares about its own products.<p>I&#x27;d love for this to be the straw that breaks the camel&#x27;s back and makes IT&#x2F;infosec orgs move away from this bilge.
评论 #28432708 未加载
评论 #28433004 未加载
评论 #28433339 未加载
评论 #28432206 未加载
评论 #28432930 未加载
spuzover 3 years ago
The linked proof-of-concept [1] demonstrates bypassing the OGNL blacklist by using this to do reflection:<p>&gt; &quot;&quot;[&quot;class&quot;].forName(...)<p>as opposed to:<p>&gt; &quot;&quot;.getClass().forName(...)<p>Does anyone know why this works in OGNL? It does not appear to be valid Java syntax.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;httpvoid&#x2F;writeups&#x2F;blob&#x2F;main&#x2F;Confluence-RCE.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;httpvoid&#x2F;writeups&#x2F;blob&#x2F;main&#x2F;Confluence-RC...</a><p>Edit: Oh apparently, it&#x27;s just a feature of OGNL: <a href="https:&#x2F;&#x2F;commons.apache.org&#x2F;proper&#x2F;commons-ognl&#x2F;language-guide.html" rel="nofollow">https:&#x2F;&#x2F;commons.apache.org&#x2F;proper&#x2F;commons-ognl&#x2F;language-guid...</a>
评论 #28432420 未加载
danielscrubsover 3 years ago
I look up to Atlassian. Somehow they continue to easily sell even though so many hates it. I don&#x27;t know what the secret sauce is... but I want it.
评论 #28438362 未加载
评论 #28436525 未加载
评论 #28437282 未加载
评论 #28436419 未加载
poloteover 3 years ago
That&#x27;s one of the selling point of Saas compared to hosted instance honestly. Some company think that having Confluence hosted internally is going to increase the security. But this is wrong. When you rely on a Saas provider. The provider has people who monitor the infrastructure constantly whereas when you hosted on your own server, the confluence instance is just one of the many services that they manage. And even if some company will be very reactive to events like this. The majority of companies will be much slower.<p>And in addition to that. When you use Saas. Security is a top priority, a Saas provider can&#x27;t allow to have data of its customers leaked on the web. Whereas once again when it is internal data people will be less cautious
评论 #28432488 未加载
评论 #28433085 未加载
评论 #28432575 未加载
darepublicover 3 years ago
The hackers will see how bad our team burndown rate is
评论 #28438859 未加载
bgroover 3 years ago
I spent years &quot;working on&quot; (battling) our own company-hosted Atlassian suite. I&#x27;m a software engineer &#x2F; architect and was thrown admin powers to get a project up and running.<p>It was constant a battle of &quot;the critical basic feature you need in this micro version is broken&quot; and other critical functions being hidden in random places.<p>I applied to their engineering team citing my experience and ability to help with a lot of these things, but never even heard a response.<p>Current alternative software suites I&#x27;ve seen are beyond terrible or generally non-existent &#x2F; missing major features. I&#x27;m sure there&#x27;s some &quot;pretty SaaS solutions&quot; out there from a startup that charges exorbitant prices, but I don&#x27;t believe their back end or security are going to be any better.
spullaraover 3 years ago
Why are internally hosted instances even available on the public internet?
评论 #28432386 未加载
评论 #28432230 未加载
评论 #28432210 未加载
评论 #28432446 未加载
diebeforei485over 3 years ago
Why is Confluence so popular anyway? Why not just use any free wiki software?
评论 #28436582 未加载
评论 #28436512 未加载
m_eimanover 3 years ago
Is there a simple way to test if I&#x27;ve applied the mitigations properly?
评论 #28432790 未加载
lamontcgover 3 years ago
Atlassian has been producing remotely exploitable code for a decade now.<p><a href="https:&#x2F;&#x2F;www.cvedetails.com&#x2F;product&#x2F;8170&#x2F;Atlassian-Jira.html?vendor_id=3578" rel="nofollow">https:&#x2F;&#x2F;www.cvedetails.com&#x2F;product&#x2F;8170&#x2F;Atlassian-Jira.html?...</a><p>I would also say based on experience that if they tell you that an exploit can&#x27;t be used against any of their other software that you shouldn&#x27;t ever believe them.
hughwover 3 years ago
Use the flaw to deploy the patch, I say.
escotover 3 years ago
Seems odd that the Priority is &quot;Low&quot; on the ticket<p><a href="https:&#x2F;&#x2F;jira.atlassian.com&#x2F;browse&#x2F;CONFSERVER-67940" rel="nofollow">https:&#x2F;&#x2F;jira.atlassian.com&#x2F;browse&#x2F;CONFSERVER-67940</a>
wly_cdgrover 3 years ago
Would sure be a shame if the only way to fix this was to delete all copies of Atlassian software from every computer worldwide
rick_rossover 3 years ago
I know a guy who said “We don’t show up on Shodan because Shodan only groups by IP and does not know the VirtualHost, we’re fine”
评论 #28433632 未加载
rifficover 3 years ago
Atlassian software are some of the most annoying to self-administrate. avoid it if you can.
zeptoover 3 years ago
Can anyone comment on what the value of this attack is to the attackers?
评论 #28437941 未加载
评论 #28436617 未加载
评论 #28436585 未加载