Skip to content

Atlassian Confluence- Unauthenticated OGNL injection vulnerability (RCE)

Notifications You must be signed in to change notification settings

Habib0x0/CVE-2022-26134

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134) in Ruby

Confluence is a web-based corporate wiki developed by Australian software company Atlassian.

On June 02, 2022 Atlassian released a security advisory for their Confluence Server and Data Center applications, highlighting a critical severity unauthenticated remote code execution vulnerability. The OGNL injection vulnerability allows an unauthenticated user to execute arbitrary code on a Confluence Server or Data Center instance.

References:

Vulnerable Environment

Execute following command to start a Confluence Server 7.13.6:

docker-compose up -d

After the environment starts, visit http://your-ip:8090 and you will see the installation guide, select "Trial installation", then you will be asked to fill in the license key. You should apply for a Confluence Server test certificate from Atlassian.

Following this guide to complete the installation.

On the database configuration page, fill in the form with database address db, database name confluence, username postgres, password postgres.

Exploit

Note: Exploit is still under development , any pull request ideas are welcomed

Habib0x

Exploit.mov

About

Atlassian Confluence- Unauthenticated OGNL injection vulnerability (RCE)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages