# Confluence Server Webwork Pre-Auth OGNL Injection (CVE-2021-26084)
Confluence is a web-based corporate wiki developed by Australian software company Atlassian.
An OGNL injection vulnerability exists that allows an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance.
References
- https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html
- https://jira.atlassian.com/browse/CONFSERVER-67940
- https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md
- https://github.com/h3v0x/CVE-2021-26084_Confluence
## Vulnerable Environment
Execute following command to start a Confluence Server 7.4.10:
```
docker-compose up -d
```
After the environment starts, visit ``http://your-ip:8090`` and you will see the installation guide, select "Trial installation", then you will be asked to fill in the license key. You should apply for a Confluence Server test certificate from Atlassian.
On the database configuration page, fill in the form with database address `db`, database name `confluence`, username `postgres`, password `postgres`.

[4.0K] /data/pocs/6190ab2fc956ce0b3192feb98a3197ba7ad6ceb7
├── [ 43K] 3.png
├── [ 234] docker-compose.yml
└── [1.1K] README.md
0 directories, 3 files