Edgecast customers utilizing our web application firewall (WAF) will have access to/can be protected from CVE-2022-26134 out of the box. Atlassian published this critical security advisory on June 2, 2022 which details an unauthenticated remote code execution (RCE) vulnerability that utilizes Object-Graph Navigation Language (OGNL) injection. This allows bad actors to execute arbitrary code on a Confluence Server or Data Center instance.
Edgecast customers utilizing any of our WAF product tiers (WAF Insights, WAF Essentials, WAF Standard and WAF Premier) for their Confluence are automatically protected from CVE-2022-26134 and were protected even prior to the patch Atlassian released on June 2nd. This is because our Managed WAF ruleset already provides all of the RCE protections mentioned in the exploit out of the box. In addition, Edgecast also provides a Custom WAF Rule builder enabling our customers to create a more specific signature to detect and mitigate similar exploits.
We strongly recommend that you run your confluence server behind a WAF on an edge network/platform to ensure we can provide you with protection from zero day exploits quickly. In addition to running WAF for these applications, we also recommend that any customer running the affected confluence server version should patch with the fixed version immediately.
The Edgecast SOC and App Security teams will continue to monitor for new attack vectors and will provide updates as needed.
Stay connected and subscribe to our RSS feed.
Call us at
Manage your account or get tools and information.