Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-26134 PoC — Atlassian Confluence Server 注入漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server 注入漏洞 (CVE-2022-26134)
Description:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server 和 Data Center 存在注入漏洞。攻击者利用该漏洞执行任意代码。以下产品及版本受到影响:1.3.0版本至7.4.17之前版本、7.13.0版本至7.13.7之前版本、7.14.0版本至7.14.3之前版本、7.15.0版本至 7.15.2之前版本、7.16.0版本至7.16.4之
Description
Confluence Server and Data Center - CVE-2022-26134 - Critical severity unauthenticated remote code execution vulnerability PoC
Readme
# CVE-2022-26134 PoC

Confluence Server and Data Center - CVE-2022-26134 - Critical severity unauthenticated remote code execution vulnerability PoC
[<img src="https://thehackernews.com/images/-bf-nviQ7QOQ/YNRYyYeddxI/AAAAAAAAC-k/OjSyvfk4SV81J_vouujuRiwnUcsZCBTyQCLcBGAsYHQ/s0/Atlassian-hacking.jpg">](https://thehackernews.com/images/-bf-nviQ7QOQ/YNRYyYeddxI/AAAAAAAAC-k/OjSyvfk4SV81J_vouujuRiwnUcsZCBTyQCLcBGAsYHQ/s0/Atlassian-hacking.jpg)

# Severity

Atlassian rates the severity level of this vulnerability as critical, according to the scale published in Atlassian severity levels. 
All versions of Confluence Server and Data Center prior to the fixed versions listed above are affected by this vulnerability.

# Fixed Versions
Released versions 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4 and 7.18.1 contain a fix for this issue.

# PoC
```
git clone https://github.com/shamo0/CVE-2022-26134.git
cd CVE-2022-26134
python3 exploit.py https://target.com CMD
```


# References

https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html

https://github.com/Nwqda/CVE-2022-26134

https://jira.atlassian.com/browse/CONFSERVER-79016

https://bugalert.org/content/notices/2022-06-02-confluence.html
File Snapshot

[4.0K] /data/pocs/62f76fec489aefb6e709143c796eb35df31edeee ├── [1.9K] exploit.py └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.