Atlassian Confluence setup-restore.action Improper Authorization Vulnerability Remote Code Execution Exploit

An improper authorization vulnerability in Atlassian Confluence allows unauthenticated remote attackers to restore the database of the instance. This allows the creation of unauthorized administrator accounts and the later installation of malicious plugins that allow the execution of OS system commands.
Exploit Platform
Exploit Type
Product Name