Are you in the loop? Keep up with the latest by making sure you're subscribed to Community Announcements. Just click Watch and select Articles.

×
Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in
Celebration

Earn badges and make progress

You're on your way to the next level! Join the Kudos program to earn points and save your progress.

Deleted user Avatar
Deleted user

Level 1: Seed

25 / 150 points

Next: Root

Avatar

1 badge earned

Collect

Participate in fun challenges

Challenges come and go, but your rewards stay with you. Do more to earn more!

Challenges
Coins

Gift kudos to your peers

What goes around comes around! Share the love by gifting kudos to your peers.

Recognition
Ribbon

Rise up in the ranks

Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!

Leaderboard

Advice on CVE-2021-3618 (alpaca) and CVE-2022-41742 (nginx)

BitScan has reported discovering our Confluence Server is vulnerable to CVE-2021-3618 and CVE-2022-41742. We can find no mention of these CVEs on the Atlassian Support site. What action, if any, do we need to take?

We are currently using nginx version 1.18, and are in the process of upgrading our Confluence Server instance to version 7.19.16 in response to the latest Atlassian Security Bulletin (re CVE-2023-22518).

1 answer

0 votes
Kian Stack Mumo Systems
Community Leader
Community Leader
Community Leaders are connectors, ambassadors, and mentors. On the online community, they serve as thought leaders, product experts, and moderators.
Nov 01, 2023

I am not seeing anything either. You could reach out to Atlassian to see if they have any further recommendations?

Thank you, Kian. I submitted a support ticket.

Suggest an answer

Log in or Sign up to answer
DEPLOYMENT TYPE
SERVER
VERSION
7.19.16
TAGS
AUG Leaders

Atlassian Community Events