Vulnerability Details : CVE-2018-13393
The convertCommentToAnswer resource in Atlassian Confluence Questions before version 2.6.6, the bundled version of Confluence Questions was updated to a fixed version in Confluence version 6.9.0, allows remote attackers to modify a comment into an answer via a Cross-site request forgery (CSRF) vulnerability.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2018-13393
- cpe:2.3:a:atlassian:questions_for_confluence:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-13393
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 33 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-13393
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2018-13393
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-13393
-
https://jira.atlassian.com/browse/CONFSERVER-56282
[CONFSERVER-56282] The convertCommentToAnswer resource of Confluence Questions was vulnerable to CSRF - CVE-2018-13393 - Create and track feature requests for Atlassian products.Issue Tracking;Vendor Advisory
-
http://www.securityfocus.com/bid/105155
Atlassian Confluence CVE-2018-13393 Cross-Site Request Forgery VulnerabilityThird Party Advisory;VDB Entry
Jump to