PT-2021-7092 · Atlassian · Confluence
Published
2021-03-06
·
Updated
2025-12-30
·
CVE-2022-26134
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Atlassian Confluence Server and Data Center versions prior to 7.4.17
Atlassian Confluence Server and Data Center versions 7.13.0 through 7.13.6
Atlassian Confluence Server and Data Center versions 7.14.0 through 7.14.2
Atlassian Confluence Server and Data Center versions 7.15.0 through 7.15.1
Atlassian Confluence Server and Data Center versions 7.16.0 through 7.16.3
Atlassian Confluence Server and Data Center versions 7.17.0 through 7.17.3
Atlassian Confluence Server and Data Center version 7.18.0
Description
The issue is related to an OGNL injection vulnerability that allows an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. This vulnerability has been exploited in real-world incidents, with attackers deploying cryptocurrency mining malware and web shells, such as BEHINDER, on compromised servers. The estimated number of potentially affected devices worldwide is not specified, but it is known that at least 211 unique IP addresses have been identified as exploiting this vulnerability.
Recommendations
For versions prior to 7.4.17, update to version 7.4.17 or later.
For versions 7.13.0 through 7.13.6, update to version 7.13.7 or later.
For versions 7.14.0 through 7.14.2, update to version 7.14.3 or later.
For versions 7.15.0 through 7.15.1, update to version 7.15.2 or later.
For versions 7.16.0 through 7.16.3, update to version 7.16.4 or later.
For versions 7.17.0 through 7.17.3, update to version 7.17.4 or later.
For version 7.18.0, update to version 7.18.1 or later.
As a temporary workaround, consider restricting access to the service through the Internet, shutting down Confluence, or blocking links containing ${ to reduce the risk.
Exploit
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2022-03284
CVE-2022-26134
Affected Products
Confluence
References · 212
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/atlassian_confluence_namespace_ognl_injection.rb⭐ 34302 🔗 14014 · Exploit
- 🔥 https://github.com/W01fh4cker/Serein⭐ 1171 🔗 190 · Exploit
- 🔥 https://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL⭐ 334 🔗 54 · Exploit
- 🔥 https://github.com/jbaines-r7/through_the_wire⭐ 160 🔗 48 · Exploit
- 🔥 https://github.com/hev0x/CVE-2022-26134⭐ 38 🔗 13 · Exploit
- 🔥 https://github.com/h3v0x/CVE-2022-26134⭐ 38 🔗 13 · Exploit
- 🔥 https://github.com/crowsec-edtech/CVE-2022-26134⭐ 32 🔗 18 · Exploit
- 🔥 https://github.com/nxtexploit/CVE-2022-26134⭐ 27 🔗 12 · Exploit
- 🔥 https://github.com/SNCKER/CVE-2022-26134⭐ 28 🔗 10 · Exploit
- 🔥 https://github.com/SIFalcon/confluencePot⭐ 20 🔗 5 · Exploit
- 🔥 https://github.com/AmoloHT/CVE-2022-26134⭐ 14 🔗 4 · Exploit
- 🔥 https://github.com/iveresk/cve-2022-26134⭐ 11 🔗 3 · Exploit
- 🔥 https://github.com/whokilleddb/CVE-2022-26134-Confluence-RCE⭐ 11 🔗 3 · Exploit
- 🔥 https://github.com/redhuntlabs/ConfluentPwn⭐ 11 🔗 3 · Exploit
- 🔥 https://github.com/abhishekmorla/CVE-2022-26134⭐ 6 🔗 5 · Exploit