Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-26134 PoC — Atlassian Confluence Server 注入漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server 注入漏洞 (CVE-2022-26134)
Description:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server 和 Data Center 存在注入漏洞。攻击者利用该漏洞执行任意代码。以下产品及版本受到影响:1.3.0版本至7.4.17之前版本、7.13.0版本至7.13.7之前版本、7.14.0版本至7.14.3之前版本、7.15.0版本至 7.15.2之前版本、7.16.0版本至7.16.4之
Description
Simple Honeypot for Atlassian Confluence (CVE-2022-26134)
Readme
# confluencePot

ConfluencePot is a simple honeypot for the Atlassian Confluence unauthenticated and remote OGNL injection vulnerability ([CVE-2022-26134](https://nvd.nist.gov/vuln/detail/CVE-2022-26134)).

![Screenshot of a public exploit and ConfluencePot](img/screenshot.png)

## About the vulnerability

You can find the official advisory by Atlassian to this vulerability [here](https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html). For details about the inner workings and exploits in the wild you should refer to the reports by [Rapid7](https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/) and [Cloudflare](https://blog.cloudflare.com/cloudflare-observations-of-confluence-zero-day-cve-2022-26134/).
Affected but not yet patched systems should be deemed **compromised** until further investigation.

## About the tool

ConfluencePot is written in Golang and implements its own HTTPS server to minimize the overall attack surface. To make it appear like a legit Confluence instance it returns a bare-bones version of a Confluence landing page. Log output is written to stdout and a log file on disk. ConfluencePot **DOES NOT** allow attackers to execute commands/code on your machine, it only logs requests and returns a bogus response.

### Building & Running it

You need a recent version of Golang to run/build confluencePot and the appropriate privileges to bind to port 443. We recommend to execute it in a tmux session for easier handling. To run ConfluencePot you either need to create a self-signed TLS certificate with *openssl* or request one from e.g. *Let's Encrypt*.

```
go build confluencePot.go
./confluencePot
```

## Testing and Issues

ConfluencePot was tested using the public exploit by [Nwqda](https://github.com/Nwqda/CVE-2022-26134), which seems to be the most used variant in the wild at the time of writing.
If you find anything wrong with confluencePot please feel free to open an issue or send us a pull request.

Follow us on Twitter --> [@SI_FalconTeam](https://twitter.com/SI_FalconTeam) <-- to stay up to date with our latest research. Stay safe!
File Snapshot

[4.0K] /data/pocs/498a7b1ba0a3e29517be3a7584cf0185ae84a61c ├── [5.0K] confluence.html ├── [4.0K] confluencePot.go ├── [ 266] go.mod ├── [1.0K] go.sum ├── [4.0K] img │   └── [ 95K] screenshot.png ├── [ 34K] LICENSE └── [2.1K] README.md 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.