关联漏洞
标题:Atlassian Confluence Server 注入漏洞 (CVE-2022-26134)Description:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server 和 Data Center 存在注入漏洞。攻击者利用该漏洞执行任意代码。以下产品及版本受到影响:1.3.0版本至7.4.17之前版本、7.13.0版本至7.13.7之前版本、7.14.0版本至7.14.3之前版本、7.15.0版本至 7.15.2之前版本、7.16.0版本至7.16.4之
Description
Confluence Server and Data Center - CVE-2022-26134 - Critical severity unauthenticated remote code execution vulnerability PoC
介绍
# CVE-2022-26134 PoC
Confluence Server and Data Center - CVE-2022-26134 - Critical severity unauthenticated remote code execution vulnerability PoC
[<img src="https://thehackernews.com/images/-bf-nviQ7QOQ/YNRYyYeddxI/AAAAAAAAC-k/OjSyvfk4SV81J_vouujuRiwnUcsZCBTyQCLcBGAsYHQ/s0/Atlassian-hacking.jpg">](https://thehackernews.com/images/-bf-nviQ7QOQ/YNRYyYeddxI/AAAAAAAAC-k/OjSyvfk4SV81J_vouujuRiwnUcsZCBTyQCLcBGAsYHQ/s0/Atlassian-hacking.jpg)
# Severity
Atlassian rates the severity level of this vulnerability as critical, according to the scale published in Atlassian severity levels.
All versions of Confluence Server and Data Center prior to the fixed versions listed above are affected by this vulnerability.
# Fixed Versions
Released versions 7.4.17, 7.13.7, 7.14.3, 7.15.2, 7.16.4, 7.17.4 and 7.18.1 contain a fix for this issue.
# PoC
```
git clone https://github.com/shamo0/CVE-2022-26134.git
cd CVE-2022-26134
python3 exploit.py https://target.com CMD
```
# References
https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
https://github.com/Nwqda/CVE-2022-26134
https://jira.atlassian.com/browse/CONFSERVER-79016
https://bugalert.org/content/notices/2022-06-02-confluence.html
文件快照
[4.0K] /data/pocs/62f76fec489aefb6e709143c796eb35df31edeee
├── [1.9K] exploit.py
└── [1.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →