In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Java(1 tweets) Linux(1 tweets) VMware(2 tweets) Windows(3 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
ds_bryan | https://bit.ly/3EOf3qT | Source ds_bryan 1631634258082013184 | 2023/03/03 |
ds_bryan | https://twitter.com/ds_bryan/status/1631634258082013184/pho... | Source ds_bryan 1631634258082013184 | 2023/03/03 |
msxfaq | https://www.msxfaq.de/windows/confluence_cve_2022_26134.htm | Source msxfaq 1635638402669240322 | 2023/03/14 |
ipssignatures | https://twitter.com/Vulnmachines/status/1553019717798936576 | Source ipssignatures 1640565881137758209 | 2023/03/28 |
jojoginta | https://medium.com | Source jojoginta 1640678627158392832 | 2023/03/28 |
__kokumoto | https://www.securityweek.com/most-weaponized-vulnerabilitie... | Source __kokumoto 1641088615957815296 | 2023/03/29 |
netsecu | https://www.seqrite.com/blog/cve-2022-26134-actively-exploi... | Source netsecu 1646679148780216320 | 2023/04/14 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
ds_bryan | bit.ly | Show Tweet |
ds_bryan | twitter.com | Show Tweet |
msxfaq | msxfaq.de | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
jojoginta | medium.com | Show Tweet |
__kokumoto | securityweek.com | Show Tweet |
netsecu | seqrite.com | Show Tweet |
Name | URL |
---|---|
Nwqda/CVE-2022-26134 | https://github.com/Nwqda/CVE-2022-26134 |
BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL | https://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL |
jbaines-r7/through_the_wire | https://github.com/jbaines-r7/through_the_wire |
0x14dli/cve2022-26134exp | https://github.com/0x14dli/cve2022-26134exp |
h3v0x/CVE-2022-26134 | https://github.com/h3v0x/CVE-2022-26134 |
SNCKER/CVE-2022-26134 | https://github.com/SNCKER/CVE-2022-26134 |
SIFalcon/confluencePot | https://github.com/SIFalcon/confluencePot |
nxtexploit/CVE-2022-26134 | https://github.com/nxtexploit/CVE-2022-26134 |
W01fh4cker/Serein | https://github.com/W01fh4cker/Serein |
iveresk/cve-2022-26134 | https://github.com/iveresk/cve-2022-26134 |
Name | URL |
---|---|
Nwqda/CVE-2022-26134 | github.com |
BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL | github.com |
jbaines-r7/through_the_wire | github.com |
0x14dli/cve2022-26134exp | github.com |
h3v0x/CVE-2022-26134 | github.com |
SNCKER/CVE-2022-26134 | github.com |
SIFalcon/confluencePot | github.com |
nxtexploit/CVE-2022-26134 | github.com |
W01fh4cker/Serein | github.com |
iveresk/cve-2022-26134 | github.com |