CVE-2021-26084
Description
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
Severity: CRITICAL
CVE ID: CVE-2021-26084
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Proof Of Concept
Nuclei Templates for CVE-2021-26084
Refrence: Project Discovery GitHub
crowsec-edtech
CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection
Refrence: GitHub
alt3kx
Refrence: GitHub
dinhbaouit
Refrence: GitHub
JKme
CVE-2021-26084 Remote Code Execution on Confluence Servers, reference: https://github.com/httpvoid/writeups/blob/main/Confluence-RCE.md
Refrence: GitHub
hev0x
Confluence Server Webwork OGNL injection
Refrence: GitHub
Udyz
Atlassian Confluence Pre-Auth RCE
Refrence: GitHub
prettyrecon
CVE-2021-26084 - Confluence Pre-Auth RCE OGNL injection 回显
Refrence: GitHub
0xf4n9x
CVE-2021-26084 Remote Code Execution on Confluence Servers
Refrence: GitHub
Vulnmachines
Remote Code Execution on Confluence Servers : CVE-2021-26084
Refrence: GitHub
Osyanina
CVE-2021-26084 Remote Code Execution on Confluence Servers
Refrence: GitHub
b1gw00d
批量检测
Refrence: GitHub
taythebot
CVE-2021-26084 - Confluence Server Webwork OGNL injection (Pre-Auth RCE)
Refrence: GitHub
bcdannyboy
PoC of CVE-2021-26084 written in Golang based on https://twitter.com/jas502n/status/1433044110277890057?s\=20
Refrence: GitHub
smallpiggy
Just run command without brain
Refrence: GitHub
maskerTUI
This is exploit
Refrence: GitHub
BeRserKerSec
This nuclei template is to verify the vulnerability without executing any commands to the target machine
Refrence: GitHub
p0nymc1
CVE-2021-26084
Refrence: GitHub
Loneyers
CVE-2021-26084 Confluence OGNL injection
Refrence: GitHub
Xc1Ym
cve-2021-26084 EXP
Refrence: GitHub
wolf1892
Setting up POC for CVE-2021-26084
Refrence: GitHub
smadi0x86
Confluence server webwork OGNL injection
Refrence: GitHub
kkin77
asjhdsajdlksavksapfoka
Refrence: GitHub
1ZRR4H
Atlassian Confluence CVE-2021-26084 one-liner mass checker
Refrence: GitHub
GlennPegden2
A quick and dirty PoC of cve-2021-26084 as none of the existing ones worked for me.
Refrence: GitHub
toowoxx
Patched Confluence 7.12.2 (CVE-2021-26084)
Refrence: GitHub
nizar0x1f
CVE-2021-26084 patch as provided in "Confluence Security Advisory - 2021-08-25"
Refrence: GitHub
dorkerdevil
Confluence OGNL injection
Refrence: GitHub
ludy-dev
[CVE-2021-26084] Confluence pre-auth RCE test script
Refrence: GitHub
wdjcy
Refrence: GitHub
orangmuda
CVE-2021-26084 - Confluence Server Webwork OGNL injection
Refrence: GitHub
TheclaMcentire
Exploit CVE 2021 26084 Confluence
Refrence: GitHub
Jun-5heng
confluence远程代码执行RCE / Code By:Jun_sheng
Refrence: GitHub
lleavesl
CVE-2021-26084,Atlassian Confluence OGNL注入漏洞
Refrence: GitHub
quesodipesto
Python 3 script to identify CVE-2021-26084 via network requests.
Refrence: GitHub
30579096
OGNL Injection in Confluence server version < 7.12.5
Refrence: GitHub
antx-code
POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.
Refrence: GitHub
vpxuser
Refrence: GitHub
nahcusira
Refrence: GitHub
Content on GitHub
sma11new | watchers:155
PocList
漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露
Refrence: GitHub
34zY | watchers:2
APT-Backpack
cve-2019-11510, cve-2019-19781, cve-2020-5902, cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-2021–26857, cve-2021–26858, cve-2021–26865
Refrence: GitHub
Jeromeyoung | watchers:0
CVE-2021-26086
Confluence OGNL Injection [CVE-2021-26084].
Refrence: GitHub