As a public-facing web application, Confluence's application-level security is obviously important. This document answers a number of questions that commonly arise when customers ask us about the security of our product.
This document is for system administrators looking to evaluate the security of the Confluence web application. It does not address Confluence's internal security – user/group management and content permissions – except as it relates to the overall application security.
パスワードの保存
When Confluence's internal user management is used, passwords are hashed through SHA1 before being stored in the database. There is no mechanism within Confluence to retrieve a user's password – when password recovery is performed, a new random password is generated and mailed to the user's registered address.
Confluence delegates session management to the Java application server in which it is deployed. We are not aware of any viable session-hijacking attacks against the Tomcat application server shipped with Confluence Standalone. If you are deploying Confluence in some other application server, you should ensure that it is not vulnerable to session hijacking.
プラグインのセキュリティ
Confluence administrators install third party plugins at their own risk. Plugins run in the same virtual machine as the Confluence server, and have access to the Java runtime environment, and the Confluence server API.
Confluence is written under the assumption that anyone given global administrator privileges is trusted. Global administrators are able, either directly or by installing plugins, to perform any operation that the Confluence application is capable of.
Provide as much information on reproducing the bug as possible
Set the security level of the bug to "Developer and Reporters only"
All communication about the vulnerability should be performed through JIRA, so we can keep track of the issue and get a patch out as soon as possible.
Confluence Security Advisories
When a security issue in Confluence is discovered and resolved, we will inform customers through the following mechanisms:
A security advisory will be posted on this page
A copy of the advisory will be sent to the confluence-users and confluence-announce mailing-lists (subscribe here).
If the person who reported the issue wants to publish an advisory through some other agency (for example, CERT), we'll assist in the production of that advisory, and link to it from our own.
Our Patch Policy
When a security issue is discovered, we will endeavour to:
issue a new, fixed Confluence version as soon as possible
issue a patch to the current stable version of Confluence
issue patches for older versions of Confluence if feasible
Patches will generally be attached to the relevant JIRA issue.
Java Policy Security with Confluence — If you would like to secure the confluence webapp to make sure plugins (or other code executed) cannot access unwanted system resources, the following will restrict file system access.