Security Bulletin - August 15 2023
August 2023 Security Bulletin
It is important to note that the issues included in this bulletin are a recent increase in scope of our disclosures, previously we focused on disclosing first party, critical severity vulnerabilities via critical advisories. The high severity vulnerabilities included in this bulletin have a lower impact from the critical advisories we have published previously. While this change results in an increase of visibility and disclosures, it does not mean there are more vulnerabilities. Rather, that we are taking a more proactive approach to vulnerability transparency and are committed to providing our customers with the information they need to make informed decisions about updating our products.
The vulnerabilities reported in this security bulletin include 1 high severity vulnerabilities which have been fixed in new versions of our products, released in the last month. These vulnerabilities are discovered via our bug bounty and pen-testing processes, as well as 3rd party library scans.
Questions about the bulletin? Read more about this new format here.
Released Security Vulnerabilities | ||||||
---|---|---|---|---|---|---|
Summary | Severity | CVSS Score | Affected Versions | CVE ID | More Details | Public Date |
Third-Party Dependency Vulnerability in Confluence | High | 7.5 |
>= 7.13.15 >= 7.19.7 >= 8.1.1 & < 7.13.19 < 7.19.11 < 8.4.1 |
CVE-2023-28709 | CONFSERVER-90185 | Aug 15, 2023 |
What you need to do
To fix all the vulnerabilities in this bulletin, Atlassian recommends upgrading your instances to the latest version, if you're unable to do so, upgrade to the minimum fix version in the table below.
Product | Fix Recommendation |
---|---|
Confluence Server and Data Center | Upgrade to a minimum fix version of 7.13.19, 7.19.11, 8.4.1 or latest |
To search for CVEs or check your products versions for disclosed vulnerabilities, check the Vulnerability Disclosure Portal