关联漏洞
标题:
Atlassian Confluence Server 注入漏洞
(CVE-2022-26134)
描述:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server 和 Data Center 存在注入漏洞。攻击者利用该漏洞执行任意代码。以下产品及版本受到影响:1.3.0版本至7.4.17之前版本、7.13.0版本至7.13.7之前版本、7.14.0版本至7.14.3之前版本、7.15.0版本至 7.15.2之前版本、7.16.0版本至7.16.4之
介绍
# CVE-2022-26134_check
The script is used to check remotely if a Confluence server is vulnerable to the CVE-2022-26134 vulnerability. This vulnerability is a remote code execution flaw that allows an attacker to execute arbitrary code on the server if left unpatched. This vulnerability was being exploited by several botnets in June to deploy cryptomining malware on unpatched installations.
Instructions for use:
- Make sure you have Python 3 installed on your system.
- Download the script and save it on your local machine.
- Open a command prompt or terminal window and navigate to the directory where you saved the script.
- Run the script using the command: python CVE-2022-26134_check.py -t [target_url]. Replace [target_url] with the URL of the Confluence server you want to check.
- The script will check if the server is vulnerable to the CVE-2022-26134 vulnerability and return the result.
- If the script returns that the server is vulnerable, it is important to apply the necessary patches or updates to secure the server.
文件快照
[4.0K] /data/pocs/40be8dcc410e3fd75256071a4e022998d4699f89
├── [ 844] CVE-2022-26134_check.py
├── [ 34K] LICENSE
└── [1.0K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。