Share
## https://sploitus.com/exploit?id=5255E938-0B92-5E2C-B1A4-21B2445C29AF
<h1 align="center">ใ€Œ๐Ÿ’ฅใ€CVE-2022-26134</h1>

<p align="center"><img src="https://www.timetoact.at/GROUP_Share/Logos/Technologie/Atlassian/Atlassian_logo_rand.png"></p>

## Description

In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.

## Demo

![demo](demo.png)

![demo2](demo2.png)

## Usage

```
pip install requests
git clone https://github.com/AmoloHT/CVE-2022-26134
cd CVE-2022-26134
python3 cve-2022-26134.py -cmd 'id' -u http://TARGET.TLD
```

## Reference

* URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26134
* MISC:http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html
* URL:http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html
* MISC:http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html
* URL:http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html
* MISC:http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html
* URL:http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html
* MISC:http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html
* URL:http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html
* MISC:https://jira.atlassian.com/browse/CONFSERVER-79016
* URL:https://jira.atlassian.com/browse/CONFSERVER-79016