Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-26134
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Atlassian Confluence Server 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server 和 Data Center 存在注入漏洞。攻击者利用该漏洞执行任意代码。以下产品及版本受到影响:1.3.0版本至7.4.17之前版本、7.13.0版本至7.13.7之前版本、7.14.0版本至7.14.3之前版本、7.15.0版本至 7.15.2之前版本、7.16.0版本至7.16.4之
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
AtlassianConfluence Data Center next of 1.3.0 ~ unspecified -
AtlassianConfluence Server next of 1.3.0 ~ unspecified -
II. Public POCs for CVE-2022-26134
#POC DescriptionSource LinkShenlong Link
1【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。https://github.com/W01fh4cker/SereinPOC Details
2Information and scripts for the confluence CVE-2022-26134https://github.com/offlinehoster/CVE-2022-26134POC Details
30-DAY: Unauthenticated Remote Code Execution in Atlassian Confluence (CVE-2022-26134).https://github.com/CyberDonkyx0/CVE-2022-26134POC Details
4This repository contains Yara rule and the method that a security investigator may want to use for CVE-2022-26134 threat hunting on their Linux confluence servers.https://github.com/th3b3ginn3r/CVE-2022-26134-Exploit-DetectionPOC Details
5CVE-2022-26134 Proof of Concepthttps://github.com/jbaines-r7/through_the_wirePOC Details
6CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injectionhttps://github.com/crowsec-edtech/CVE-2022-26134POC Details
7Nonehttps://github.com/kyxiaxiang/CVE-2022-26134POC Details
8(CVE-2022-26134)an unauthenticated and remote OGNL injection vulnerability resulting in code execution in the context of the Confluence serverhttps://github.com/Brucetg/CVE-2022-26134POC Details
9Confluence Server and Data Center - CVE-2022-26134 - Critical severity unauthenticated remote code execution vulnerability PoChttps://github.com/shamo0/CVE-2022-26134POC Details
10[CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass.https://github.com/SNCKER/CVE-2022-26134POC Details
11Nonehttps://github.com/Sakura-nee/CVE-2022-26134POC Details
12Nonehttps://github.com/Vulnmachines/Confluence-CVE-2022-26134POC Details
13Atlassian confluence pochttps://github.com/axingde/CVE-2022-26134POC Details
14CVE-2022-26134https://github.com/1rm/Confluence-CVE-2022-26134POC Details
15Nonehttps://github.com/0xAgun/CVE-2022-26134POC Details
16Nonehttps://github.com/abhishekmorla/CVE-2022-26134POC Details
17Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)https://github.com/h3v0x/CVE-2022-26134POC Details
18This repository talks about Zero-Day Exploitation of Atlassian Confluence, it's defense and analysis point of view from a SecOps or Blue Team perspectivehttps://github.com/archanchoudhury/Confluence-CVE-2022-26134POC Details
19Simple Honeypot for Atlassian Confluence (CVE-2022-26134)https://github.com/SIFalcon/confluencePotPOC Details
20Nonehttps://github.com/PsykoDev/CVE-2022-26134POC Details
21Nonehttps://github.com/vesperp/CVE-2022-26134-ConfluencePOC Details
22Atlassian Confluence 远程代码执行漏洞(CVE-2022-26134)https://github.com/li8u99/CVE-2022-26134POC Details
23Implementation of CVE-2022-26134https://github.com/reubensammut/cve-2022-26134POC Details
24Nonehttps://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELLPOC Details
25CVE-2022-26134 Confluence OGNL Injection POChttps://github.com/alcaparra/CVE-2022-26134POC Details
26Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection https://github.com/whokilleddb/CVE-2022-26134-Confluence-RCEPOC Details
27Atlassian Confluence- Unauthenticated OGNL injection vulnerability (RCE) https://github.com/Habib0x0/CVE-2022-26134POC Details
28Nonehttps://github.com/Y000o/Confluence-CVE-2022-26134POC Details
29Atlassian confluence unauthenticated ONGL injection remote code execution scanner (CVE-2022-26134).https://github.com/redhuntlabs/ConfluentPwnPOC Details
30CVE-2022-26134https://github.com/cai-niao98/CVE-2022-26134POC Details
31CVE-2022-26134, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. This is CVE-2022-26134 expoitation scripthttps://github.com/sunny-kathuria/exploit_CVE-2022-26134POC Details
32[CVE-2022-26134] Attlasian Confluence RCEhttps://github.com/KeepWannabe/BotConPOC Details
33CVE-2022-26134 - Pre-Auth Remote Code Execution via OGNL Injectionhttps://github.com/Chocapikk/CVE-2022-26134POC Details
34「💥」CVE-2022-26134 - Confluence Pre-Auth RCEhttps://github.com/AmoloHT/CVE-2022-26134POC Details
35[PoC] Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE)https://github.com/kh4sh3i/CVE-2022-26134POC Details
36Atlassian Confluence OGNL Injection Remote Code Execution (RCE) Vulnerability (CVE-2022-26134)https://github.com/ColdFusionX/CVE-2022-26134POC Details
37PoC for exploiting CVE-2022-26134 on Confluencehttps://github.com/Luchoane/CVE-2022-26134_conFLUPOC Details
38Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability.https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134POC Details
39Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)https://github.com/nxtexploit/CVE-2022-26134POC Details
40Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).https://github.com/Debajyoti0-0/CVE-2022-26134POC Details
41Nonehttps://github.com/f4yd4-s3c/cve-2022-26134POC Details
42confluence rcehttps://github.com/coskper-papa/CVE-2022-26134POC Details
43This is a python script that can be used with Shodan CLI to mass hunting Confluence Servers vulnerable to CVE-2022-26134https://github.com/p4b3l1t0/confusploitPOC Details
44CVE-2022-26134-PoChttps://github.com/twoning/CVE-2022-26134-PoCPOC Details
45Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server.https://github.com/iveresk/cve-2022-26134POC Details
46远程攻击者在Confluence未经身份验证的情况下,可构造OGNL表达式进行注入,实现在Confluence Server或Data Center上执行任意代码,在现有脚本上修改了poc,方便getshell。https://github.com/keven1z/CVE-2022-26134POC Details
47CVE-2022-26134-Consolehttps://github.com/shiftsansan/CVE-2022-26134-ConsolePOC Details
48CVE-2022-26134 web payloadhttps://github.com/1337in/CVE-2022-26134webPOC Details
49Detecting CVE-2022-26134 using Nucleihttps://github.com/skhalsa-sigsci/CVE-2022-26134-LABPOC Details
50Nonehttps://github.com/yigexioabai/CVE-2022-26134-cve1POC Details
51在受影响的Confluence Server 和Data Center 版本中,存在一个OGNL 注入漏洞,该漏洞允许未经身份验证的攻击者在Confluence Server 或Data Center 服务器上执行任意代码。https://github.com/kailing0220/CVE-2022-26134POC Details
52批量检测CVE-2022-26134 RCE漏洞https://github.com/xanszZZ/ATLASSIAN-Confluence_rcePOC Details
53Confluence Server and Data Center存在一个远程代码执行漏洞,未经身份验证的攻击者可以利用该漏洞向目标服务器注入恶意ONGL表达式,进而在目标服务器上执行任意代码。https://github.com/kelemaoya/CVE-2022-26134POC Details
54cve-2022-26134https://github.com/CJ-0107/cve-2022-26134POC Details
55CVE-2022-26134https://github.com/latings/CVE-2022-26134POC Details
56CVE-2022-26134pochttps://github.com/yyqxi/CVE-2022-26134POC Details
57Nonehttps://github.com/b4dboy17/CVE-2022-26134POC Details
58CVE-2022-26134 GO POC 练习https://github.com/wjlin0/CVE-2022-26134POC Details
59Nonehttps://github.com/cbk914/CVE-2022-26134_checkPOC Details
60Nonehttps://github.com/MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShellPOC Details
61Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)https://github.com/Muhammad-Ali007/Atlassian_CVE-2022-26134POC Details
62A PoC for CVE-2022-26134 for Educational Purposes and Security Researchhttps://github.com/acfirthh/CVE-2022-26134POC Details
63Nonehttps://github.com/yTxZx/CVE-2022-26134POC Details
64Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)https://github.com/hev0x/CVE-2022-26134POC Details
65Nonehttps://github.com/DARKSTUFF-LAB/-CVE-2022-26134POC Details
66Nonehttps://github.com/CatAnnaDev/CVE-2022-26134POC Details
67Nonehttps://github.com/404fu/CVE-2022-26134-POCPOC Details
68confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)https://github.com/BBD-YZZ/Confluence-RCEPOC Details
69CVE-2022-26134 exploit scripthttps://github.com/cc3305/CVE-2022-26134POC Details
70This repository contains Yara rule and the method that a security investigator may want to use for CVE-2022-26134 threat hunting on their Linux confluence servers.https://github.com/ma1am/CVE-2022-26134-Exploit-DetectionPOC Details
71Nonehttps://github.com/xsxtw/CVE-2022-26134POC Details
72Nonehttps://github.com/Agentgilspy/CVE-2022-26134POC Details
73Nonehttps://github.com/XiaomingX/CVE-2022-26134-pocPOC Details
74Nonehttps://github.com/XiaomingX/cve-2022-26134-pocPOC Details
75Active Exploitation of Atlassian’s Questions for Confluence App CVE-2022-26134https://github.com/Khalidhaimur/CVE-2022-26134POC Details
76cve-2022-26134 atlassia Confluence Data Center2016 server OGNL %[...}https://github.com/mr-won/cve-2022-26134POC Details
77Confluence Server and Data Center is susceptible to an unauthenticated remote code execution vulnerability. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-26134.yamlPOC Details
78Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Confluence%20OGNL%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-26134.mdPOC Details
79https://github.com/vulhub/vulhub/blob/master/confluence/CVE-2022-26134/README.mdPOC Details
80cve-2022-26134 atlassia Confluence Data Center2016 server OGNL %[...}https://github.com/user20252228/cve-2022-26134POC Details
81Nonehttps://github.com/Gilospy/CVE-2022-26134POC Details
82cve-2022-26134 atlassia Confluence Data Center2016 server OGNL %[...}https://github.com/tpdlshdmlrkfmcla/cve-2022-26134POC Details
83Atlassian's Confluence Server and Data Center editions (Vulnerable Version > 7.18.1)https://github.com/thetowsif/CVE-2022-26134POC Details
84CVE-2022-26134 - Confluence Pre-Auth Remote Code Execution [RCE]https://github.com/Yuri08loveElaina/CVE-2022-26134POC Details
85Nonehttps://github.com/MAHABUB122003/Atlassian-CVE-2022-26134POC Details
86CVE-2022-26134 is a Go-based exploitation framework targeting a critical OGNL injection vulnerability in Atlassian Confluence Server/Data Center.https://github.com/Hghost0x00/CVE-2022-26134-GOPOC Details
87Atlassian Confluence RCE Exploitation Frameworkhttps://github.com/Anon2Fear/CVE-2022-26134POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-26134
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-26134

No comments yet


Leave a comment