Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/CONFSERVER-61453 | Issue Tracking Vendor Advisory |
https://jira.atlassian.com/browse/CONFSERVER-61453 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://jira.atlassian.com/browse/CONFSERVER-61453 - Issue Tracking, Vendor Advisory |
13 May 2022, 20:53
Type | Values Removed | Values Added |
---|---|---|
References | (N/A) https://jira.atlassian.com/browse/CONFSERVER-61453 - Issue Tracking, Vendor Advisory | |
CPE | cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:* |
17 Jun 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Affected versions of Confluence Server before 7.4.8, and versions from 7.5.0 before 7.11.0 allow attackers to identify internal hosts and ports via a blind server-side request forgery vulnerability in Team Calendars parameters. |
Information
Published : 2021-05-07 06:15
Updated : 2025-02-12 21:15
NVD link : CVE-2020-29445
Mitre link : CVE-2020-29445
CVE.ORG link : CVE-2020-29445
JSON object : View
Products Affected
atlassian
- confluence_server
CWE
CWE-918
Server-Side Request Forgery (SSRF)