These days, our server in ECS is attacted. It's reported that a bash runned.
Hi @李鑫峰
while patching the vulnerable Confluence installation alongside with removing the malicious crypto miner is the correct measure in first place you would need to assess if the server is compromised in a way it needs probably to be restored from backup.
Basically a machine got hacked like yours should not be trusted anymore. Please do a thorough check of the environment, too. The malware seen in that cases is reported to "jump" to other hosts, too.
Regards,
Daniel
Please patch your server soon as possible.
https://searchsecurity.techtarget.com/news/252506129/Atlassian-Confluence-flaw-under-active-attack
Solution:
https://jira.atlassian.com/browse/CONFSERVER-67940?src=confmacro
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Yes, seems like @李鑫峰 is affected by CVE-2021-26084 Confluence Server Webwork OGNL injection . Applying the workaround script will assist in temporarily mitigating against all known vulnerable end points.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.