Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-3396 PoC — Atlassian Confluence Server 路径遍历漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server 路径遍历漏洞 (CVE-2019-3396)
Description:Atlassian Confluence Server是澳大利亚Atlassian公司的一套专业的企业知识管理与协同软件,也可以用于构建企业WiKi。 Atlassian Confluence Server中存在安全漏洞。远程攻击者可借助Widget Connector宏利用该漏洞执行代码。以下版本受到影响:Atlassian Confluence Server 6.6.12之前版本,6.7.0版本至6.12.3之前版本,6.13.0版本至6.13.3之前版本,6.14.0版本至6.14.2之前版本。
Readme
# CVE-2019-3396_Confluence

All documentation is in [script file](./exploit.py). This exploit is also [part of](https://www.exploit-db.com/exploits/49465) Exploit Database maintained by Offensive Security.

## Screenshots

![](./screenshots/confluence_version.png)

![](./screenshots/mode_1_file_system_directory_content.png)

![](./screenshots/mode_1_file_system_file_content.png)

![](./screenshots/mode_2_rce_id_existing_personal_space.png)

![](./screenshots/mode_2_rce_whoami_verbose_missing_personal_space.png)
File Snapshot

[4.0K] /data/pocs/a0b7913113639a370f248bab0d4008e0b7e6f0f3 ├── [ 31K] exploit.py ├── [ 517] README.md ├── [ 116] requirements.txt └── [4.0K] screenshots ├── [5.9M] confluence_version.png ├── [2.0M] mode_1_file_system_directory_content.png ├── [1.5M] mode_1_file_system_file_content.png ├── [746K] mode_2_rce_id_existing_personal_space.png └── [2.4M] mode_2_rce_whoami_verbose_missing_personal_space.png 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.