关联漏洞
标题:
Atlassian Confluence Server 注入漏洞
(CVE-2021-26084)
描述:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server and Data Center 存在注入漏洞,经过身份验证的用户在Confluence 服务器或数据中心实例上执行任意代码。以下产品及版本收到影响:All 4.x.x versions、All 5.x.x versions、All 6.0.x versions、All 6.1.x ver
描述
Confluence server webwork OGNL injection
介绍
<h1 align="right">
<br>
<a href="https://github.com/smadi0x86/CVE-2021-26084"><img src="https://upload.wikimedia.org/wikipedia/commons/thumb/8/88/Atlassian_Confluence_2017_logo.svg/2560px-Atlassian_Confluence_2017_logo.svg.png" alt="confluence.logo"></a>
<br>
CVE-2021-26084
<br>
</h1>
<h3 align="center">An OGNL injection vulnerability exists that would allow an authenticated user and in some instances unauthenticated user to execute arbitrary code on a confluence server or data center instance.</h3>
<p align="center">
<a href="">
<img src="https://img.shields.io/badge/python-py-yellow.svg">
<img src="https://img.shields.io/badge/General-Exploits-black.svg">
</a>
</p>
## ✅ QueryString param request :

## ☢️ Usage :
``$ python3 CVE-2021-26084_Confluence.py -u http://website.com``
## 📜 References :
- https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html
- https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md
## ⚠️ Disclaimer :
- I am not responsible for any misuse of this information, its only for education purposes
## 📞 Contact :
<p align="center">
<a href="https://linkedin.com/in/saud-smadi" target="blank"><img align="center" src="https://cdn.jsdelivr.net/npm/simple-icons@3.0.1/icons/linkedin.svg" alt="smadi" height="25" width="25" /></a>
<a href="https://twitter.com/@smadi0x86" target="blank"><img align="center" src="https://cdn.jsdelivr.net/npm/simple-icons@7.5.0/icons/twitter.svg" alt="smadi" height="25" width="25" /></a>
<a href="https://t.me/rootsmadi" target="blank"><img align="center" src="https://cdn.jsdelivr.net/npm/simple-icons@3.0.1/icons/telegram.svg" alt="smadi" height="25" width="25" /></a>
<a href="https://smadi0x86-blog.gitbook.io/smadi0x86-blog/" target="blank"><img align="center" src="https://cdn.jsdelivr.net/npm/simple-icons@7.5.0/icons/gitbook.svg" alt="smadi" height="25" width="25" /></a>
</p>
文件快照
[4.0K] /data/pocs/002e0c8f894a5b8f603c382c3531dea9b20302bb
├── [3.2K] CVE-2021-26084_Confluence.py
├── [2.0K] README.md
└── [6.6K] vulnsites.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。