Learn about CVE-2020-24897, a high-severity vulnerability in Table Filter and Charts for Confluence Server app allowing remote attackers to execute XSS attacks. Find mitigation steps and prevention measures.
The Table Filter and Charts for Confluence Server app before 5.3.25 (for Atlassian Confluence) allow remote attackers to inject arbitrary HTML or JavaScript via cross-site scripting (XSS) through the provided Markdown markup to the "Table from CSV" macro.
Understanding CVE-2020-24897
This CVE involves a vulnerability in the Table Filter and Charts for Confluence Server app that could be exploited by attackers to execute XSS attacks.
What is CVE-2020-24897?
The CVE-2020-24897 vulnerability allows remote attackers to inject malicious HTML or JavaScript code through the Table from CSV macro in the affected Confluence Server app.
The Impact of CVE-2020-24897
The impact of this vulnerability is rated as HIGH, with a CVSS base score of 8.9. It can lead to unauthorized access, data manipulation, and potential compromise of sensitive information.
Technical Details of CVE-2020-24897
This section provides more technical insights into the CVE.
Vulnerability Description
The vulnerability in the Table Filter and Charts for Confluence Server app allows for the injection of arbitrary HTML or JavaScript code through the Markdown markup, specifically in the "Table from CSV" macro.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2020-24897 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates