Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-26138 PoC — Atlassian Confluence Server 信任管理问题漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server 信任管理问题漏洞 (CVE-2022-26138)
Description:The Atlassian Questions For Confluence app for Confluence Server and Data Center creates a Confluence user account in the confluence-users group with the username disabledsystemuser and a hardcoded password. A remote, unauthenticated attacker with knowledge of the hardcoded password could exploit this to log into Confluence and access all content accessible to users in the confluence-users group. This user account is created when installing versions 2.7.34, 2.7.35, and 3.0.2 of the app.
Readme
# CVE-2022-26138

CVE-2022-23131 - SAML SSO bypass

```
fofa: icon_hash="-305179312"
```
File Snapshot

[4.0K] /data/pocs/aea7c3c1eb87caeafdf23f38dc6d3a1bba41c816 ├── [1.6K] CVE-2022-26138.py ├── [ 11K] LICENSE └── [ 89] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →