声明
本程序仅供于学习交流,请使用者遵守《中华人民共和国网络安全法》,勿将此脚本用于非授权的测试,脚本开发者不负任何连带法律责任。
代码
{
"Name": "Confluence RCE(CVE-2021-26084)",
"Level": "3",
"Tags": [
"RCE"
],
"GobyQuery": "product=\"Confluence\"",
"Description": "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.",
"Product": "Atlassian Confluence",
"Homepage": "https://www.atlassian.com/zh/software/confluence",
"Author": "aetkrad",
"Impact": "<p>allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance<br></p>",

该博客详细介绍了Atlassian Confluence中存在的一严重漏洞CVE-2021-26084,这是一个未授权的远程代码执行(RCE)漏洞。攻击者可以利用此漏洞在受影响的Confluence实例上执行任意代码。博客提供了漏洞的详细描述、影响范围、推荐的安全措施以及利用代码示例,提醒用户及时更新到不受影响的版本以防止潜在的安全风险。
最低0.47元/天 解锁文章
2478

被折叠的 条评论
为什么被折叠?



