Forums

Articles
Create
cancel
Showing results for 
Search instead for 
Did you mean: 

Running patch cve-2021-26084-update.sh results in permission denied

Bill Bailey
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
September 6, 2021

I am trying to run the patch as directed via the security alert https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html 

I am on Centos 7.9. I have followed the steps in the notice to run the patch script, but I keep getting permission denied.  Is there some step that is missing, or is the script being expected to run from within a specific directory?

2 answers

1 accepted

2 votes
Answer accepted
Robert Wen_Cprime_
Community Champion
September 6, 2021

A couple of questions...

1. Did you set the INSTALLATION_DIRECTORY variable inside the script to the root directory where Confluence is installed?

2. Are you running the script as the owner of that directory?

Bill Bailey
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
September 6, 2021

Yeah, it was #2.  I misread this instruction:

Change to the Linux user that owns the files in the Confluence Installation directory, for example

As being the user running confluence, not owning the files. Doh!

So the patch runs. Hopefully I can no get time to upgrade. F'ing hackers!

0 votes
Daniel Ebers
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
September 10, 2021

Hi @Bill Bailey

it sounds you are on the right path - probably the patch was applied already meanwhile.
Adding to what I could see in the Community the last days it might be needed to assess if a hacker already exploited the vulnerability.
If so, restoring the server from a backup proven not being hacked might make absolutetely sense.
Reading what the malware is capable of there are signs it tends to "come back" (leaving some backdoors). The specific 'miner' is also reported to make connections to other systems via SSH connections - in case there is ANY sign of hack it might be needed to check connected systems, too.

Hopefully it is not the case and the mitigation script alongside with an upgrade long-term is everything that was needed for your case.

Regards,
Daniel

Suggest an answer

Log in or Sign up to answer
DEPLOYMENT TYPE
SERVER
VERSION
6.13.8
TAGS
AUG Leaders

Atlassian Community Events