The vulnerability is exploited in the wild by unidentified attackers (but seems to be from somewhere in Asia 😉) and was spotted by the company Volexity against one of its customers.
Once the vulnerability has been exploited, a classic implant (as a form of a JSP page) is deployed to maintain access and progress.
Here is the article from Volexity: https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/
And the Atlassian Editor’s Advisory: https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
This is not the first time a group of attackers use a 0-day vulnerability (unknown to the rest of the world) to compromise exposed assets to Internet. This is a behavior that tends to become widespread with the reuse of the exploit, very quickly after its publication, by groups of cybercriminals.
Besides, now that the exploit code is public, everyone scans the Internet to find Confluence and hack them 😞.
The vulnerability
The vulnerability is quite trivial to exploit and allows executing a command directly on the Confluence server, without authentication.
Because it’s a command injection, it’s very stable and the exploit works every time!
Simply send the following request to a Confluence server (with the injected command in red: