Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-3398 PoC — Atlassian Confluence Server和Atlassian Data Center 路径遍历漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server和Atlassian Data Center 路径遍历漏洞 (CVE-2019-3398)
Description:Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has 'Admin' permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center. All versions of Confluence Server from 2.0.0 before 6.6.13 (the fixed version for 6.6.x), from 6.7.0 before 6.12.4 (the fixed version for 6.12.x), from 6.13.0 before 6.13.4 (the fixed version for 6.13.x), from 6.14.0 before 6.14.3 (the fixed version for 6.14.x), and from 6.15.0 before 6.15.2 are affected by this vulnerability.
Description
Python script to exploit confluence path traversal vulnerability cve-2019-3398
Readme
# cve-2019-3398
## Details
A quick python proof of concept for CVE-2019-3398 confluence vulnerability written in python.

Confluence version 6.12.3, 6.13.3, 6.14.2, and 6.15.1 are affected.

The exploit requires working credentials.
# To use
Edit the `os_username` and `os_password` fields, and possibly the `filename` path depending on the vulnerable server. If the path is set right, `shell.jsp` will be available on the root of the web server.
File Snapshot

[4.0K] /data/pocs/eed4818c0b76b7fde60d2d5c171b6efbac7aa4f4 ├── [2.2K] poc.py └── [ 447] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →