
Cloud Vulnerability DB
A community-led vulnerabilities database
A blind server-side request forgery (SSRF) vulnerability was identified in Confluence Server, tracked as CVE-2020-29445. The vulnerability affects Confluence Server versions before 7.4.8, and versions from 7.5.0 before 7.11.0. This security issue was discovered by Stefano Castilletti, a security researcher at Apple (Atlassian Jira).
The vulnerability exists in Team Calendars parameters, allowing attackers to identify internal hosts and ports through a blind server-side request forgery attack. The vulnerability has been assigned a CVSS Score of 4.3 (Medium severity) (Atlassian Jira).
When exploited, this vulnerability enables attackers to perform network reconnaissance by identifying internal hosts and ports within the target organization's infrastructure (NVD).
Atlassian has released fixed versions to address this vulnerability. Users are recommended to upgrade to either Confluence Server version 7.11.0 or version 7.4.8 (LTS) to mitigate this security issue (Atlassian Jira).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."