You are here

RCE in Confluence (OGNL Injection)

RCE, confluence

A critical RCE (Remote Code Execution) vulnerability for Atlassian Confluence with CVSS 10 has been published [1]. Exploits are available [2].

Airlock Gateway blocks known exploits with default Deny Rule TI_002 in level Standard (Group Template and Expression Language Injection).


We recommend updating all affected Confluence instances as soon as possible.

We further recommend to make sure that the Deny Rule Group Template and Expression Language Injection is active on all mappings protecting Atlassian Confluence instances.

In general, we recommend to check on a timely and regular basis that a suitable security level (usually Standard or Strict) for all Deny Rule groups is activated on all mappings for a preventive protection of your back-end applications.

Airlock Vulnerability Status: 
Does not affect Airlock
Back-end Vulnerability Status: 
Airlock protects, requires changes in configuration