Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2021-26084 PoC — Atlassian Confluence Server 注入漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server 注入漏洞 (CVE-2021-26084)
Description:In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
Readme
# CVE-2021-26084-EXP

This code is an exploit for the CVE-2021-26084 vulnerability. The vulnerability affects specific versions of software and allows remote attackers to perform arbitrary command injection attacks.

## Vulnerability Description

CVE-2021-26084 is a command injection vulnerability that affects certain versions of software. By constructing a malicious request, an attacker can inject malicious commands and execute them on the target system.

## Prerequisites

- Go 1.17 or later

## Usage

### Step 1: Clone the Repository

```
git clone https://github.com/your-repository.git
```

### Step 2: Change to the Code Directory

```
cd CVE-2021-26084-EXP
```

### Step 3: Compile the Code

```
go build -o cve-2021-26084-exp main.go
```

### Step 4: Run the Code

```
./cve-2021-26084-exp -u <target-url> -c <command-to-execute>
```

Available options:

- `-u`: Target URL, specifying the URL of the target system where the vulnerability exists.
- `-c`: Command to execute, the command you want to execute on the target system.

### Step 5: Check the Results

The program will send the malicious request and wait for the response. If the vulnerability is detected, it will display "Vulnerability detected" and extract the result of the command execution.

## Notes

- This code is intended for authorized penetration testing and educational purposes only. Ensure that you use it within the scope of legal authorization and comply with applicable laws and regulations.
- Testing systems without proper authorization using this code is illegal and may result in severe consequences.

## Disclaimer

This code is provided for educational and research purposes only. The user is solely responsible for any direct or indirect loss caused by the use of this code. The author assumes no liability for any loss or damage caused by the use of this code.

Please carefully read and understand the associated risks and responsibilities before using this code.
File Snapshot

[4.0K] /data/pocs/680f53ae04cce97de947f6d42879d45e4f66e646 ├── [ 224] go.mod ├── [ 865] go.sum ├── [3.3K] main.go └── [2.0K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →