p4b3l1t0 / confusploit

This is a python script that can be used with Shodan CLI to mass hunting Confluence Servers vulnerable to CVE-2022-26134

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

This is a Script to find vulnerable servers to CVE-2022-26134 and can be used together SHODAN CLI and Bash Scripting One-Liner

Please use only for legal and educational purposes

Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)

  • On June 02, 2022 Atlassian released a security advisory for their Confluence Server and Data Center applications, highlighting a critical severity unauthenticated remote code execution vulnerability. The OGNL injection vulnerability allows an unauthenticated user to execute arbitrary code on a Confluence Server or Data Center instance.

Installation

Clone the repo:

git clone https://github.com/p4b3l1t0/confusploit.git && cd confusploit

Install requirements:

pip3 install -r requirements.txt 

Give permissions:

chmod +x confusploit.py

Execute and choose your best option:

python3 confusploit.py

About

This is a python script that can be used with Shodan CLI to mass hunting Confluence Servers vulnerable to CVE-2022-26134


Languages

Language:Python 100.0%