<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509666#M1709</link>
    <description>&lt;P&gt;We are seeing the same false positive.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I opened a ticket the TAC and they are requesting a full packet capture. I'm hesitant to do this on prisma gateways because it's unclear how to reproduce the traffic AND the destination IP changes so the packet capture could be running and running.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are using the SaaS version of Atlassian, and according to the Security Advisory (&lt;A href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html" target="_blank" rel="noopener"&gt;https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html) :&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Atlassian Cloud sites are protected&lt;BR /&gt;&lt;BR /&gt;If your Confluence site is accessed via an&lt;SPAN&gt;&amp;nbsp;atlassian.net&lt;SPAN&gt;&amp;nbsp;domain, it&lt;SPAN&gt;&amp;nbsp;is hosted by Atlassian and is not vulnerable.&lt;BR /&gt;Our investigations have not found any evidence of exploitation of Atlassian Cloud.&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So I'm tempted to make a signature exception in the Antivirus Profile.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Other ideas?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 22 Jul 2022 21:38:54 GMT</pubDate>
    <dc:creator>jdub_cloud</dc:creator>
    <dc:date>2022-07-22T21:38:54Z</dc:date>
    <item>
      <title>False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/500778#M1654</link>
      <description>&lt;P&gt;Threat ID 92632 was added late 6/3 for the new Atlassian 0-day exploit. All morning we have been seeing false positives on the new signature. Anyone else seeing the same?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems to be alerting to the inclusion of javascript ad code across multiple websites, sourced from:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;A href="https://pdc.bidswitch.net/max_mrc_vimp/" target="_blank"&gt;https://pdc.bidswitch.net/max_mrc_vimp/&lt;/A&gt;&amp;lt;long-alphanum-string&amp;gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;A href="https://pdc.bidswitch.net/max_mimp/" target="_blank"&gt;https://pdc.bidswitch.net/max_mimp/&lt;/A&gt;&amp;lt;long-alphanum-string&amp;gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;A href="https://pdc.bidswitch.net/max_groupm_vimp/" target="_blank"&gt;https://pdc.bidswitch.net/max_groupm_vimp/&lt;/A&gt;&amp;lt;long-alphanum-string&amp;gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 21:14:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/500778#M1654</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-06-06T21:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/500977#M1655</link>
      <description>&lt;P&gt;Can confirm, we are seeing at least one of the same domains showing up with the same false positives.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 04:46:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/500977#M1655</guid>
      <dc:creator>PStrickland</dc:creator>
      <dc:date>2022-06-07T04:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/503967#M1663</link>
      <description>&lt;P&gt;Seeing the same from that domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 21:59:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/503967#M1663</guid>
      <dc:creator>RicardoWaffle</dc:creator>
      <dc:date>2022-06-15T21:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509666#M1709</link>
      <description>&lt;P&gt;We are seeing the same false positive.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I opened a ticket the TAC and they are requesting a full packet capture. I'm hesitant to do this on prisma gateways because it's unclear how to reproduce the traffic AND the destination IP changes so the packet capture could be running and running.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are using the SaaS version of Atlassian, and according to the Security Advisory (&lt;A href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html" target="_blank" rel="noopener"&gt;https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html) :&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Atlassian Cloud sites are protected&lt;BR /&gt;&lt;BR /&gt;If your Confluence site is accessed via an&lt;SPAN&gt;&amp;nbsp;atlassian.net&lt;SPAN&gt;&amp;nbsp;domain, it&lt;SPAN&gt;&amp;nbsp;is hosted by Atlassian and is not vulnerable.&lt;BR /&gt;Our investigations have not found any evidence of exploitation of Atlassian Cloud.&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So I'm tempted to make a signature exception in the Antivirus Profile.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Other ideas?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 21:38:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509666#M1709</guid>
      <dc:creator>jdub_cloud</dc:creator>
      <dc:date>2022-07-22T21:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509688#M1710</link>
      <description>&lt;P&gt;Are you receiving the alert on connections to your Atlassian instance? Or on connections from your users to a random third party website? For my false alert (and others I believe), there is no Atlassian server involved at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the threat alert there should be a packet capture. If you export that capture and open it in Wireshark you can reassemble the packets into a formated output: select a packet in the capture and select "Follow -&amp;gt; tcp stream". A new window will pop up of the assembled packet like:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2" color="#000000"&gt;&lt;SPAN&gt;GET /max_groupm_vimp/WfcV4AtmWp-XiYB2f6ONSJuCKVlVq&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2" color="#000000"&gt;&lt;SPAN&gt;AawN1cry1La8bIQ_hGvGVv9Gvscuzgnjh0c6FKolAawN1cry1La8bIQ_hGvGVv9Gv&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2" color="#000000"&gt;&lt;SPAN&gt;...&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2" color="#000000"&gt;&lt;SPAN&gt;Host: pdc.bidswitch.net&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2" color="#000000"&gt;...&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2" color="#000000"&gt;&lt;SPAN&gt;Referer: &lt;A href="https://www.cnn.com/" target="_blank"&gt;https://www.cnn.com/&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT size="2" color="#000000"&gt;...&lt;/FONT&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;GET - the URL path&lt;/P&gt;
&lt;P&gt;Host - the host server FQDN that was connected to&lt;/P&gt;
&lt;P&gt;Referer - the original server FQDN of the page that the reference to the URL was in (if it was an included object)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should be able to identify the destination and recreate the alert by copying the host and URL into a separate browser window and downloading again.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 22:02:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509688#M1710</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-07-22T22:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509851#M1711</link>
      <description>&lt;P&gt;Just like you, I'm receiving these alerts on traffic NOT going to Atlassian instances.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looking at the PCAP, I see:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;GET /max_groupm_vimp/cqBEM_QBMxlLhguztF9yWmT6DTPGVEEVnYEQlMjfCLPdRn-yMBZug....&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Host: pdc.bidswitch.net&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;Referer: &lt;A href="https://www.usatoday.com/" target="_blank"&gt;https://www.usatoday.com/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 21:54:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509851#M1711</guid>
      <dc:creator>jdub_cloud</dc:creator>
      <dc:date>2022-07-25T21:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509857#M1712</link>
      <description>&lt;P&gt;Yep, so the alert is hitting on the content included from pbc.bidswitch.net on usatoday.com. Bidswitch is an ad company. You can probably replicate the alert by calling the URL&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;A href="https://pdc.bidswitch.net" target="_blank"&gt;https://pdc.bidswitch.net&lt;/A&gt; /max_groupm_vimp/cqBEM_QBMxlLhguztF9yWmT6DTPGVEEVnYEQlMjfCLPdRn-yMBZug....&lt;/P&gt;
&lt;P&gt;directly in your browser (you might have to play around some HTTP variables). Once you can replicate the alert from calling the URL directly (instead of being buried in usatoday.com's code), its easy to do a packet capture of just that request.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 22:10:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/509857#M1712</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-07-25T22:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Atlassian Confluence Remote Code Execution Vulnerability 92632</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/510004#M1713</link>
      <description>&lt;P&gt;Right on! Thanks so much&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/184804"&gt;@Adrian_Jensen&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I feel like this should be the responsibility of TAC engineering to identify / test their patterns, but if it can help others, I'll give it a go. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 00:02:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-atlassian-confluence-remote-code-execution/m-p/510004#M1713</guid>
      <dc:creator>jdub_cloud</dc:creator>
      <dc:date>2022-07-27T00:02:12Z</dc:date>
    </item>
  </channel>
</rss>

