Latest Atlassian Confluence Flaw Exploited to Breach Jenkins Project Server

News

The maintainers of Jenkins—a popular open-source automation server software—have disclosed a security breach after unidentified threat actors gained access to one of their servers by exploiting a recently disclosed vulnerability in Atlassian Confluence service to install a cryptocurrency miner.

The “successful attack,” which is believed to have occurred last week, was mounted against its Confluence service that had been deprecated since October 2019, leading the team to take the server offline, rotate privileged credentials, and reset passwords for developer accounts.

“At this time we have no reason to believe that any Jenkins releases, plugins, or source code have been affected,” the company said in a statement published over the weekend.

The disclosure comes as the U.S. Cyber Command warned of ongoing mass exploitation attempts in the wild targeting a now-patched critical security vulnerability affecting Atlassian Confluence deployments.

Tracked as CVE-2021-26084 (CVSS score: 9.8), the flaw concerns an OGNL (Object-Graph Navigation Language) injection flaw that, in specific instances, could be exploited to execute arbitrary code on a Confluence Server or Data Center instance.

According to cybersecurity firm Censys, a search engine for finding internet devices, around 14,637 exposed and vulnerable Confluence servers were discovered right before details about the flaw became public on August 25, a number that has since dropped to 8,597 as of September 5 as companies continue to apply Atlassian’s patches and pull afflicted servers from being reachable over the internet.

Products You May Like

Articles You May Like

Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm
Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
BreachForums Shuts Down After Admin’s Arrest
Google Pixel phones had a serious data leakage bug – here’s what to do!
CISA Alerts on Critical Security Vulnerabilities in Industrial Control Systems

Leave a Reply

Your email address will not be published. Required fields are marked *