Finding Confluence servers (again) with runZero
An actively exploited zero-day has surfaced in popular wiki software Confluence. Deemed “critical” in severity, this vulnerability affects all supported versions of Confluence Server and Confluence Data Center, and also older, unsupported versions (i.e. everything after version 1.3.0). Hosted instances within Atlassian Cloud are reportedly protected from exploitation.
What is the impact?
Upon successful exploitation via OGNL template injection, this vulnerability (tracked as CVE-2022-26134) can provide unauthenticated remote code execution (RCE) to an attacker. Cybersecurity firm Volexity discovered the vulnerability while performing incident response, and noted, confirmed, and disclosed the actively exploited attack vector to Atlassian.
Are updates available?
Atlassian has made fixes available for a number of versions and strongly encourages admins to update. If patching in the near term isn’t viable, mitigation strategies to limit exploitation opportunities are also provided. CISA has added this zero-day to its Known Exploited Vulnerabilities Catalog, with advice to block internet access to affected Confluence products.
How do I find potentially vulnerable Confluence instances with runZero?
From the Service Inventory, use the following pre-built query to locate assets running Confluence within your network which may need remediation or mitigation:
product:confluence OR (_asset.protocol:http AND protocol:http AND has:http.head.xConfluenceRequestTime)

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.
Get runZero for free
Don’t have runZero and need help finding vulnerable Confluence instances?
Start your trial today
Similar Content
February 3, 2023
Finding Lexmark printer assets
Printer manufacturer Lexmark recently published details on a vulnerability that affects over 100 of their printer models. Learn how runZero can help you find potentially affected assets.
December 9, 2022
Finding Cisco 7800 and 8800 series IP phone assets on your network
Cisco 7800 and 8800 IP phones can be found in many companies and organizations. Successful exploitation of this vulnerability can provide an unauthenticated attacker in the same network segment or VLAN with remote code execution or denial-of-service capabilities.
December 5, 2022
Finding MegaRAC BMC assets on your network
MegaRAC can be found in many server manufacturers’ Baseboard Management Controllers (BMCs), including AMD, Ampere Computing, ASRock, Asus, ARM, Dell EMC, Gigabyte, HPE, Huawei, Inspur, Lenovo, Nvidia, Qualcomm, Quanta, and Tyan. Successful exploitation of these …