Security for everyone

CVE-2015-8399 Scanner

Detects 'Information Disclosure' vulnerability in Atlassian Confluence affects v. before 5.8.17.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one


Parent Category

CVE-2015-8399 Scanner Detail

Atlassian Confluence is a popular web-based collaboration tool that is used by millions of professionals worldwide. The software is designed to help teams collaborate and share information in a more efficient and organized manner. The tool is primarily used in businesses and organizations to create, edit, and share knowledge and information within a team or with clients.

One of the vulnerabilities detected in Atlassian Confluence is CVE-2015-8399. This security flaw allowed remote authenticated users to access configuration files through the decoratorName parameter in two different administrative actions, including spaces/viewdefaultdecorator.action and admin/viewdefaultdecorator.action. This vulnerability could allow attackers to access sensitive information such as passwords, user data, and system settings.

If this vulnerability is exploited, it can lead to a range of adverse consequences. For instance, it can lead to an unauthorized disclosure of sensitive information that could be exploited by attackers to gain unauthorized access to the system or carry out other malicious activities. Additionally, the attacker could manipulate system configurations and settings, leading to system instability, system crash, or data loss.

By using the pro features of the platform, businesses and organizations can stay up to date on the latest vulnerabilities affecting their digital assets. The platform offers advanced capabilities such as threat intelligence feeds, vulnerability scanning, and real-time alerts, making it easier for businesses to identify and address critical vulnerabilities before they can be exploited. With the right tools and best practices, businesses can ensure the security and reliability of their digital assets, protecting them from both internal and external threats.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture