9.8
CVSSv3

CVE-2021-26084

Published: 30/08/2021 Updated: 08/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 682
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated malicious user to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 prior to 7.4.11, from version 7.5.0 prior to 7.11.6, and from version 7.12.0 prior to 7.12.5.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian confluence server

atlassian confluence data center

Exploits

This Metasploit module exploits an OGNL injection in Atlassian Confluence's WebWork component to execute commands as the Tomcat user ...
Confluence Server version 7124 unauthenticated OGNL injection remote code execution exploit ...

Github Repositories

CVE-2021-26084-EXP This code is an exploit for the CVE-2021-26084 vulnerability The vulnerability affects specific versions of software and allows remote attackers to perform arbitrary command injection attacks Vulnerability Description CVE-2021-26084 is a command injection vulnerability that affects certain versions of software By constructing a malicious request, an attack

[CVE-2021-26084] Confluence pre-auth RCE test script

CVE-2021-26084_PoC [CVE-2021-26084] Confluence pre-auth RCE test script Usage: py <dst_ip> <dst_port>

Confluence server webwork OGNL injection

CVE-2021-26084 An OGNL injection vulnerability exists that would allow an authenticated user and in some instances unauthenticated user to execute arbitrary code on a confluence server or data center instance ✅ QueryString param request : ☢️ Usage : $ python3 CVE-2021-26084_Confluencepy -u websitecom 📜 References : confluence

Confluence Server Webwork Pre-Auth OGNL Injection (CVE-2021-26084) Confluence is a web-based corporate wiki developed by Australian software company Atlassian An OGNL injection vulnerability exists that allows an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance References confluenceatlassiancom/doc/confluence-securit

Remote Code Execution on Confluence Servers : CVE-2021-26084

Confluence_CVE-2021-26084 Remote Code Execution on Confluence Servers : CVE-2021-26084 PoC Confluence Possible exploit endpoints <REDACTED>/login <REDACTED>/pages/templates2/viewpagetemplateaction <REDACTED>/template/custom/content-editor <REDACTED>/templates/editor-preload-container https

POC列表

pocs 使用poctools框架编写的漏洞PoC脚本集合,框架问题和PoC问题都可以在本项目提交issue。 poctools框架适用于个人做漏洞研究,批量扫描引擎请使用: githubcom/yanmengfei/spoce 安装框架 pip install poctools -i pypiorg/simple/ 使用 以Atlassian Confluence Server 注入漏

信息收集自动化工具

水泽-信息收集自动化工具 郑重声明:文中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途以及盈利等目的,否则后果自行承担。 0x01 介绍 作者:Ske 团队:0x727,未来一段时间将陆续开源工具,地址:githubcom/0x727 定位:协助红队人员快

CVE-2021-26084 - Confluence Server Webwork OGNL injection (Pre-Auth RCE)

CVE-2021-26084 Proof of concept for CVE-2021-26084 Confluence Server Webwork OGNL injection (Pre-Auth RCE) Disclaimer This is for educational purposes only I am not responsible for your actions Use at your own discretion Command Limiations Due to the payload, it is not possible to pass some characters The list below is what I've found during my testing Double quotat

PoC of CVE-2021-26084 written in Golang based on https://twitter.com/jas502n/status/1433044110277890057?s=20

CVE-2021-26084_GoPOC PoC of CVE-2021-26084 written in Golang based on twittercom/jas502n/status/1433044110277890057?s=20

A collection of intelligence about Log4Shell and its exploitation activity.

Log4Shell-IOCs Members of the Curated Intelligence Trust Group have compiled a list of IOC feeds and threat reports focused on the recent Log4Shell exploit targeting CVE-2021-44228 in Log4j (Blog | Twitter | LinkedIn) Analyst Comments: 2021-12-13 IOCs shared by these feeds are LOW-TO-MEDIUM CONFIDENCE we strongly recommend NOT adding them to a blocklist These could potential

CVE-2021-26084 - Confluence Server Webwork OGNL injection

CVE-2021-26084 Introduction This write-up provides an overview of CVE-2021-26084 - Confluence Server Webwork OGNL injection [1] that would allow an authenticated user to execute arbitrary code on a Confluence Server or Data Center instance TL;DR Confluence Server / Data Center makes use of Webwork 2 MVC framework to process web requests and the view layer primarily consists of

Confluence OGNL injection

CVE-2021-26084 Confluence OGNL injection CVE-2021-26084 is an Object-Graph Navigation Language (OGNL) injection vulnerability in the Atlassian Confluence Webwork implementation An unauthenticated, remote attacker could exploit this flaw by sending a specially crafted request to vulnerable endpoints on the Confluence Server or Data Center instance Successful exploitation would

confluence远程代码执行RCE / Code By:Jun_sheng

CVE-2021-26084 confluence远程代码执行RCE Code By:Jun_sheng @橘子网络安全实验室 橘子网络安全实验室 0rangeteam/ 0x00 风险概述 本工具仅限授权安全测试使用,禁止未授权非法攻击站点 在线阅读《中华人民共和国网络安全法》 0x01 工具使用 批量RCE脚本请将URL导入urltxt 单站点RCE请使用下面的命

CVE-2021-26084 Remote Code Execution on Confluence Servers

CVE-2021-26084 CVE-2021-26084 Remote Code Execution on Confluence Servers Dork Fofa: app="ATLASSIAN-Confluence" Usage Show help information python PoCpy Vulnerability verification for individual websites python PoCpy -u 1111 Command execution python PoCpy -u 11

CVE-2021-26084 Remote Code Execution on Confluence Servers

CVE-2021-26084 CVE-2021-26084 Remote Code Execution on Confluence Servers Dork Fofa: app="ATLASSIAN-Confluence" Usage Show help information python PoCpy Vulnerability verification for individual websites python PoCpy -u 1111 Command execution python PoCpy -u 11

Confluence server webwork OGNL injection

CVE-2021-26084 An OGNL injection vulnerability exists that would allow an authenticated user and in some instances unauthenticated user to execute arbitrary code on a confluence server or data center instance ✅ QueryString param request : ☢️ Usage : $ python3 CVE-2021-26084_Confluencepy -u websitecom 📜 References : confluence

Blogs, Tools and other available resources for source code review.

Blogs, Tools and other available resources for source code review Blogs SSRF to RCE with Jolokia and MBeans Anatomy of an Exploit: RCE with CVE-2020-1350 SIGRed Reproducing the Microsoft Exchange Proxylogon Exploit Chain Java-Deserialization-Cheat-Sheet EXIF RCE Argument injection in dragonfly gem Pre-Auth RCE in ForgeRock WOO-Commerce SQLI Deserialization on Rails Confluence

This nuclei template is to verify the vulnerability without executing any commands to the target machine

CVE-2021-26084-Nuclei-template This nuclei template is to verify the vulnerability without executing any commands to the target machine

水泽-信息收集自动化工具 郑重声明:文中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途以及盈利等目的,否则后果自行承担。 0x01 介绍 作者:Ske 团队:0x727,未来一段时间将陆续开源工具,地址:githubcom/0x727 定位:协助红队人员快

Atlassian Confluence Pre-Auth RCE

CVE-2021-26084 Atlassian Confluence Pre-Auth RCE

CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection

CVE-2021-26084 CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection Install requirements pip3 install -r requirementstxt Run exploit USE: python3 exploitpy targetcom CMD Ex: python3 exploitpy targetcom id Ex: python3 exploitpy targetcom 'ls -la'

CVE-2021-26084 - Confluence Server Webwork OGNL injection

CVE-2021-26084 Introduction This write-up provides an overview of CVE-2021-26084 - Confluence Server Webwork OGNL injection [1] that would allow an authenticated user to execute arbitrary code on a Confluence Server or Data Center instance TL;DR Confluence Server / Data Center makes use of Webwork 2 MVC framework to process web requests and the view layer primarily consists of

Confluence Server Webwork OGNL injection

CVE-2021-26084 - Confluence Server Webwork OGNL injection An OGNL injection vulnerability exists that would allow an authenticated user and in some instances unauthenticated user to execute arbitrary code on a Confluence Server or Data Center instance IMPORTANT This exploit is only intended to facilitate demonstrations of the vulnerability by researchers I disapprove of ill

atlassian pbkdf2 dehash

Original Intention In one of the projects which is authorized we performed, we managed to gain the Atlassian Confluence server access by exploiting the CVE-2021-26084 RCE vulnerability to add a public key into their authorized ssh file We then proceed to perform the lateral movement by performing a localhost reconnaissance in which the database account password is in the conf

atlassian pbkdf2_hash blasting

atlassian_pbkdf2_dehash 初衷 atlassian confluence产品,爆发CVE-2021-26084漏洞,在一次HW项目中内网目标机器不出网,通过CVE-2021-26084漏洞写入公钥,拿到服务器权限。在<confluence-home-directory>/database 文件夹中找到数据库账号密码。一种方法是通过查找管理员,通过修改hash值登陆web管理后台。

CVE-2021-26084-EXP This code is an exploit for the CVE-2021-26084 vulnerability The vulnerability affects specific versions of software and allows remote attackers to perform arbitrary command injection attacks Vulnerability Description CVE-2021-26084 is a command injection vulnerability that affects certain versions of software By constructing a malicious request, an attack

CVE-2021-26084,Atlassian Confluence OGNL注入漏洞

CVE-2021-26084 CVE-2021-26084,Atlassian Confluence OGNL注入漏洞 Atlassian Confluence 是企业广泛使用的维基系统,其部分版本中存在OGNL 表达式注入漏洞。攻击者可以通过漏洞,不需要任何用户的情况下在目标Confluence 中执行任意代码。 queryString参数执行任意命令 queryString=%5cu0027%2b%7bClassforName%28%5cu0027jav

CVE-2021-26084 Remote Code Execution on Confluence Servers

westone-CVE-2021-26084-scanner A vulnerability scanner that detects CVE-2021-26084 vulnerabilities

水泽-信息收集自动化工具 郑重声明:文中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途以及盈利等目的,否则后果自行承担。 0x01 介绍 作者:Ske 团队:0x727,未来一段时间将陆续开源工具,地址:githubcom/0x727 定位:协助红队人员快

Just run command without brain

cve-2021-26084-confluence Just run command without brain

This is exploit

CVE-2021-26084 This is exploit wikipocpy -u xxxxxcom -p /pages/createpage-entervariablesaction?SpaceKey=x

CVE-2021-26084

CVE-2021-26084 CVE-2021-26084

CVE-2021-26084 Confluence OGNL injection

CVE-2021-26084 CVE-2021-26084 Confluence OGNL injection

Setting up POC for CVE-2021-26084

confluence-rce-poc Setting up POC for CVE-2021-26084 (Docker) Feed official docker-entrypointsh to postgres, change db username and password as required

Atlassian Confluence CVE-2021-26084 one-liner mass checker

CVE-2021-26084 Atlassian Confluence CVE-2021-26084 one-liner mass checker cat confluence_serverstxt | while read host do; do curl --connect-timeout 10 --max-time 60 --path-as-is --silent --insecure --user-agent "Mozilla/51 (Windows NT 61; Win64; x64; rv:590) Gecko/20100101 Firefox/590" "$host/pages/createpage-entervariablesaction?SpaceKey=x" |

A quick and dirty PoC of cve-2021-26084 as none of the existing ones worked for me.

This is a quick and dirty poc, tuned for a specifc confluence instance as none of the existing off the shelf pocs worked Obviously it's almost entirely based on the work of githubcom/httpvoid/writeups/blob/main/Confluence-RCEmd and githubcom/alt3kx/CVE-2021-26084_PoC You'll need to set some variables in the script host is the host your checking

Patched Confluence 7.12.2 (CVE-2021-26084)

docker-confluence-patched Patched Confluence 7122 (CVE-2021-26084)

Confluence server webwork OGNL injection

CVE-2021-26084 An OGNL injection vulnerability exists that would allow an authenticated user and in some instances unauthenticated user to execute arbitrary code on a confluence server or data center instance ✅ QueryString param request : ☢️ Usage : $ python3 CVE-2021-26084_Confluencepy -u websitecom 📜 References : confluence

Python 3 script to identify CVE-2021-26084 via network requests.

ConfluCHECK Python 3 script to identify CVE-2021-26084 via network requests Requirement pip install -r requirementstxt How to use First of all, said that i'm not an expert programer then i'm pretty sure that my code may be improve, i will accept pull request python3 conflucheckpy python3 conflucheckpy xxxxxxxxxxxx:yyyy python3 conflucheckpy

CVE-2021-26084 patch as provided in "Confluence Security Advisory - 2021-08-25"

CVE-2021-26084 patch CVE-2021-26084 patch provided by "Confluence Security Advisory - 2021-08-25" this is just a workaround for linux based servers, attlasian has provided a new fixed verssion if you don't want to upgrade just patch it ! instalation download the cve-2021-26084-update file, and make sure to run it as directory admin set the following variables

水泽-信息收集自动化工具 郑重声明:文中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途以及盈利等目的,否则后果自行承担。 0x01 介绍 作者:Ske 团队:0x727,未来一段时间将陆续开源工具,地址:githubcom/0x727 定位:协助红队人员快

CVE-2021-26084 (PoC) | Confluence Server Webwork OGNL injection An OGNL injection vulnerability exists that would allow an authenticated user, and in some instances unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance My fight to locate the entrypoints and injections XD Fight (1) Fight (2) Finally confluence Entrypoints Ex

POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.

CVE-2021-26084 Description POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity create by antx at 2022-01-13 Detail In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an authenticated user, and in some instances an unaut

CVE-2021-26084 - Confluence Server Webwork OGNL injection

CVE-2021-26084 Introduction This write-up provides an overview of CVE-2021-26084 - Confluence Server Webwork OGNL injection [1] that would allow an authenticated user to execute arbitrary code on a Confluence Server or Data Center instance TL;DR Confluence Server / Data Center makes use of Webwork 2 MVC framework to process web requests and the view layer primarily consists of

CVE-2021-26084-EXP This code is an exploit for the CVE-2021-26084 vulnerability The vulnerability affects specific versions of software and allows remote attackers to perform arbitrary command injection attacks Vulnerability Description CVE-2021-26084 is a command injection vulnerability that affects certain versions of software By constructing a malicious request, an attack

Python3 RCE PoC for CVE-2021-26084

CVE-2021-26084_Confluence_RCE Python3 RCE PoC for CVE-2021-26084

Recent Articles

Atlassian warns of critical Confluence flaw
The Register • Simon Sharwood, APAC Editor • 26 Aug 2021

Get our weekly newsletter 9.8-rated bug allows arbitrary code execution – possibly without authentication

Atlassian has warned users of its Confluence Server that they need to patch the product to remedy a Critical-rated flaw. The company's not saying a lot about CVE-2021-26084, besides describing it as a "Confluence Server Webwork OGNL injection vulnerability … that would allow an authenticated user, and in some instances unauthenticated user, to execute arbitrary code on a Confluence Server or Data Center instance." The bug scores 9.8 on the ten-point Common Vulnerability Scoring System. Atlassi...

Five Eyes nations reveal 2021's fifteen most-exploited flaws
The Register • Jessica Lyons Hardcastle • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Malicious cyber actors go after 2021's biggest misses, spend less time on the classics

Security flaws in Log4j, Microsoft Exchange, and Atlassian's workspace collaboration software were among the bugs most frequently exploited by "malicious cyber actors" in 2021 , according to a joint advisory by the Five Eyes nations' cybersecurity and law enforcement agencies. It's worth noting that 11 of the 15 flaws on the list were disclosed in 2021, as previous years' lists often found miscreants exploiting the older vulns for which patches had been available for years. Of course, the US Cyb...