Atlassian Confluence version 6.12.1 suffers from a Widget Connector Macro template injection vulnerability.
888ab1e7f8753b1713aba7f23fe7c61f5e0d5096cc4c393063a6c530b5041be2
Widget Connector Macro is part of Atlassian Confluence Server and Data Center that allows embed online videos, slideshows, photostreams and more directly into page. A _template parameter can be used to inject remote Java code into a Velocity template, and gain code execution. Authentication is not required to exploit this vulnerability. By default, Java payload will be used because it is cross-platform, but you can also specify which native payload you want (Linux or Windows). Confluence before version 6.6.12, from version 6.7.0 before 6.12.3, from version 6.13.0 before 6.13.3 and from version 6.14.0 before 6.14.2 are affected.
f4c247f9a9679d32c545b710244463bf290d04f611d0ecce6a6427fde7c101ef
Atlassian Confluence versions 6.6.0 up to 6.6.12, 6.12.0 up to 6.12.3, 6.13.0 up to 6.13.3, and 6.14.0 up to 6.14.2 suffer from a server-side request forgery vulnerability via WebDAV and a remote code execution vulnerability via the Widget Connector macro.
6815f5ede86e6165662c3fa9e98b1bc174808159c2c011d507237ad6bf678d74