Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-3396
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Atlassian Confluence Server 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Atlassian Confluence Server是澳大利亚Atlassian公司的一套专业的企业知识管理与协同软件,也可以用于构建企业WiKi。 Atlassian Confluence Server中存在安全漏洞。远程攻击者可借助Widget Connector宏利用该漏洞执行代码。以下版本受到影响:Atlassian Confluence Server 6.6.12之前版本,6.7.0版本至6.12.3之前版本,6.13.0版本至6.13.3之前版本,6.14.0版本至6.14.2之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
AtlassianConfluence Server unspecified ~ 6.6.12 -
II. Public POCs for CVE-2019-3396
#POC DescriptionSource LinkShenlong Link
1Confluence Widget Connector RCEhttps://github.com/dothanthitiendiettiende/CVE-2019-3396POC Details
2Confluence Widget Connector path traversal (CVE-2019-3396)https://github.com/x-f1v3/CVE-2019-3396POC Details
3Nonehttps://github.com/xiaoshuier/CVE-2019-3396POC Details
4CVE-2019-3396 confluence SSTI RCEhttps://github.com/Yt1g3r/CVE-2019-3396_EXPPOC Details
5Confluence 未授权 RCE (CVE-2019-3396) 漏洞https://github.com/jas502n/CVE-2019-3396POC Details
6Confluence Widget Connector RCEhttps://github.com/pyn3rd/CVE-2019-3396POC Details
7Nonehttps://github.com/s1xg0d/CVE-2019-3396POC Details
8Confluence Widget Connector RCE - ptquanhttps://github.com/quanpt103/CVE-2019-3396POC Details
9 Confluence Widget Connector path traversal (CVE-2019-3396)https://github.com/vntest11/confluence_CVE-2019-3396POC Details
10https://github.com/Yt1g3r/CVE-2019-3396_EXP.githttps://github.com/tanw923/test1POC Details
11CVE-2019-3396 漏洞验证txt与模板文件。https://github.com/skommando/CVE-2019-3396-confluence-pocPOC Details
12TESThttps://github.com/JonathanZhou348/CVE-2019-3396TESTPOC Details
13Nonehttps://github.com/am6539/CVE-2019-3396POC Details
14For testhttps://github.com/W2Ning/CVE-2019-3396POC Details
15windows.vmhttps://github.com/yuehanked/cve-2019-3396POC Details
16Nonehttps://github.com/abdallah-elsharif/cve-2019-3396POC Details
17Nonehttps://github.com/46o60/CVE-2019-3396_ConfluencePOC Details
18Confluence unauthorize template injectionhttps://github.com/PetrusViet/cve-2019-3396POC Details
19Nonehttps://github.com/0xNinjaCyclone/cve-2019-3396POC Details
20CVE-2019-3396 Memshell for Behinderhttps://github.com/Avento/CVE-2019-3396-Memshell-for-BehinderPOC Details
21The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-3396.yamlPOC Details
22Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Confluence%20preview%20SSTI%E6%A8%A1%E7%89%88%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2019-3396.mdPOC Details
23Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Confluence%20%E8%B7%AF%E5%BE%84%E7%A9%BF%E8%B6%8A%E4%B8%8E%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2019-3396.mdPOC Details
24Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/confluence-cve-2019-3396-lfi.ymlPOC Details
25https://github.com/vulhub/vulhub/blob/master/confluence/CVE-2019-3396/README.mdPOC Details
26CVE-2019-3396 confluence SSTI RCEhttps://github.com/kh4sh3i/CVE-2019-3396POC Details
27Nonehttps://github.com/HK4zCzi/CVE-2019-3396-Velocity-Server-Side-Template-InjectionPOC Details
28Nonehttps://github.com/tno01/cve-2019-3396POC Details
29Nonehttps://github.com/tranphuc2005/CVE-2019-3396POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-3396
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-3396

No comments yet


Leave a comment