Pwning Confluence via Template Injection for fun and learning - CVE-2023-22527

Pwning Confluence via Template Injection for fun and learning - CVE-2023-22527

CVEs

9.8 Critical Severity

Apps

7.19.14.*
7.19.21.*
7.19.22.*
7.19.20.*
7.19.19.*
7.19.18.*
7.19.17.*
7.19.16.*
7.19.9.*
7.17.5.*
7.19.11.*
7.19.26.*
7.19.27.*
7.19.23.*
7.19.28.*
7.19.15.*
7.19.24.*
7.19.25.*
7.19.30.*
7.19.21.*

Screenshots from the blog posts

images/clv2tbjx0rsg71imx9luz29un.jpgimages/clv2tbjx0rsg71imx9luz29un.jpg

Summary

An OGNL injection was discovered in some versions of Atlassian Confluence. The affected versions are prone to RCE via an unauthenticated attacker, making this issue critical. This post breaks down the working of the existing exploit for this CVE, showcasing the complete exploitation process to get a shell on the underlying confluence server.

Script link

A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center. - Manh130902/CVE-2023-22527-POC

image

Description

@secatgourity

190 posts

Total vcoins

0

Social media links

Comments (0)