exploitdb
WORKING POC
by Fellipe Oliveira · pythonwebappsjava
https://www.exploit-db.com/exploits/50243
This exploit leverages an OGNL injection vulnerability in Confluence Server to achieve unauthenticated remote code execution. It constructs a malicious payload using JavaScript evaluation within the OGNL context to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Atlassian Confluence Server < 7.12.5
No auth needed
Prerequisites:
Target must be running a vulnerable version of Confluence Server · Network access to the target's web interface
nomisec
WORKING POC
315 stars
by hev0x · remote
https://github.com/hev0x/CVE-2021-26084_Confluence
This repository contains a functional Python exploit for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence Server. The exploit leverages the 'queryString' parameter to execute arbitrary commands via JavaScript evaluation, achieving remote code execution (RCE) on vulnerable systems.
Classification
Working Poc 95%
Target:
Atlassian Confluence Server < 7.12.5
No auth needed
Prerequisites:
Network access to the target Confluence Server · Vulnerable endpoint exposed
nomisec
WORKING POC
72 stars
by 0xf4n9x · remote
https://github.com/0xf4n9x/CVE-2021-26084
This repository contains a functional Python exploit for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence Server. The PoC demonstrates remote code execution by leveraging unsafe OGNL expression evaluation in the 'queryString' parameter.
Classification
Working Poc 95%
Target:
Atlassian Confluence Server (versions before 6.13.23, 7.4.11, 7.11.6, 7.12.5)
No auth needed
Prerequisites:
Network access to vulnerable Confluence instance · Python 3 environment with required libraries (requests, bs4)
nomisec
WORKING POC
54 stars
by dinhbaouit · remote
https://github.com/dinhbaouit/CVE-2021-26084
This PoC exploits CVE-2021-26084, an OGNL injection vulnerability in Confluence Server/WebApp, by sending a crafted POST request with malicious OGNL payload to execute arbitrary commands. The payload uses Java Runtime.exec() to trigger remote command execution.
Classification
Working Poc 95%
Target:
Atlassian Confluence Server/WebApp (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to vulnerable Confluence instance · Target must be unpatched for CVE-2021-26084
nomisec
WRITEUP
54 stars
by alt3kx · remote
https://github.com/alt3kx/CVE-2021-26084_PoC
This repository provides a detailed technical analysis of CVE-2021-26084, an OGNL injection vulnerability in Confluence Server. It includes entry points, manual inspection steps, and references to external writeups, but lacks functional exploit code.
Classification
Writeup 90%
Target:
Atlassian Confluence Server/Data Center
No auth needed
Prerequisites:
Access to vulnerable Confluence instance · Knowledge of OGNL injection techniques
nomisec
SCANNER
30 stars
by 1ZRR4H · poc
https://github.com/1ZRR4H/CVE-2021-26084
This repository contains a one-liner bash script that checks for the presence of CVE-2021-26084 in Atlassian Confluence by sending a crafted HTTP request and analyzing the response. It does not exploit the vulnerability but scans for its presence.
Classification
Scanner 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
List of target Confluence servers
nomisec
WORKING POC
21 stars
by crowsec-edtech · poc
https://github.com/crowsec-edtech/CVE-2021-26084
This repository contains a functional exploit for CVE-2021-26084, an OGNL injection vulnerability in Confluence leading to pre-authentication remote code execution. The exploit uses crafted payloads to execute arbitrary commands via the `/pages/doenterpagevariables.action` endpoint.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Vulnerable version of Confluence
nomisec
SUSPICIOUS
9 stars
by Vulnmachines · remote
https://github.com/Vulnmachines/Confluence_CVE-2021-26084
The repository lacks functional exploit code and instead provides a list of endpoints and external links to a writeup and video. No technical details or PoC code are included, making it a potential lure for external downloads.
Classification
Suspicious 90%
Target:
Atlassian Confluence Server
No auth needed
Prerequisites:
Access to vulnerable Confluence instance
nomisec
WORKING POC
8 stars
by taythebot · remote
https://github.com/taythebot/CVE-2021-26084
This repository contains a functional Go-based exploit for CVE-2021-26084, a pre-authentication OGNL injection vulnerability in Confluence Server. The exploit allows remote command execution by crafting malicious HTTP requests to the vulnerable endpoint.
Classification
Working Poc 100%
Target:
Atlassian Confluence Server
No auth needed
Prerequisites:
Network access to the target Confluence Server instance
nomisec
WORKING POC
7 stars
by lleavesl · remote
https://github.com/lleavesl/CVE-2021-26084
This repository contains a functional Python exploit for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. The exploit allows remote command execution by injecting malicious OGNL expressions via the 'queryString' parameter.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Atlassian Confluence · Network access to the target
nomisec
WORKING POC
5 stars
by BBD-YZZ · remote
https://github.com/BBD-YZZ/Confluence-RCE
This repository contains a functional exploit for CVE-2022-26134, a Confluence RCE vulnerability, with a GUI interface for executing commands and reverse shells. The PoC includes multiple Confluence CVEs and supports proxy configurations.
Classification
Working Poc 90%
Target:
Atlassian Confluence
No auth needed
Prerequisites:
Network access to vulnerable Confluence instance · Python environment
nomisec
WORKING POC
5 stars
by JKme · remote
https://github.com/JKme/CVE-2021-26084
This repository contains a functional exploit PoC for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. The script sends a crafted POST request to the target endpoint, exploiting the vulnerability to confirm its presence by checking for a specific response pattern.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Target endpoint must be accessible
nomisec
WRITEUP
4 stars
by orangmuda · remote
https://github.com/orangmuda/CVE-2021-26084
This repository provides a detailed technical analysis of CVE-2021-26084, an OGNL injection vulnerability in Confluence Server/Data Center. It includes payload examples and explains the root cause involving double evaluation in Webwork tags and Velocity templates.
Classification
Writeup 95%
Target:
Atlassian Confluence Server/Data Center < 7.12.14
No auth needed
Prerequisites:
Network access to Confluence Server · Specific endpoints enabled (e.g., signup.action for unauthenticated RCE)
nomisec
WORKING POC
3 stars
by ludy-dev · remote
https://github.com/ludy-dev/CVE-2021-26084_PoC
This repository contains functional exploit code for CVE-2021-26084, a pre-authentication remote code execution vulnerability in Atlassian Confluence. The PoC sends a crafted HTTP POST request with an OGNL injection payload to execute arbitrary commands (e.g., 'whoami') on the target system.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Vulnerable version of Confluence
nomisec
SUSPICIOUS
3 stars
by Loneyers · poc
https://github.com/Loneyers/CVE-2021-26084
The repository contains only a README with images and no actual exploit code or technical details. It lacks any functional PoC, code snippets, or analysis, making it a potential lure.
Classification
Suspicious 90%
Target:
Atlassian Confluence
No auth needed
nomisec
SCANNER
3 stars
by BeRserKerSec · remote
https://github.com/BeRserKerSec/CVE-2021-26084-Nuclei-template
This repository contains a Nuclei template for detecting CVE-2021-26084, an OGNL injection vulnerability in Confluence Server. The template sends a crafted GET request to test for the vulnerability by checking if the response contains the concatenated string 'foobar'.
Classification
Scanner 90%
Target:
Atlassian Confluence Server
No auth needed
Prerequisites:
Access to the target Confluence Server instance
nomisec
WORKING POC
2 stars
by toowoxx · poc
https://github.com/toowoxx/docker-confluence-patched
This repository provides a Dockerfile that patches Confluence 7.12.2 against CVE-2021-26084 by applying an official Atlassian workaround script and modifying the footer to indicate the patch status. The exploit itself is not included, but the patch demonstrates the vulnerability's context.
Classification
Working Poc 90%
Target:
Atlassian Confluence 7.12.2
No auth needed
Prerequisites:
Docker environment · Access to the Confluence instance
nomisec
WRITEUP
1 stars
by nahcusira · poc
https://github.com/nahcusira/CVE-2021-26084
This repository provides a detailed technical analysis of CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. It explains the root cause, exploitation mechanism, and detection methods, including how to bypass OGNL blacklists using Unicode escape sequences.
Classification
Writeup 95%
Target:
Atlassian Confluence (versions < 6.13.23, 6.14.0 ≤ < 7.4.11, 7.5.0 ≤ < 7.11.6, 7.12.0 ≤ < 7.12.5)
No auth needed
Prerequisites:
Access to vulnerable Confluence instance · Ability to send crafted HTTP requests
nomisec
WORKING POC
1 stars
by Jun-5heng · remote
https://github.com/Jun-5heng/CVE-2021-26084
This repository contains functional exploit code for CVE-2021-26084, a remote code execution (RCE) vulnerability in Atlassian Confluence. The scripts demonstrate command injection via crafted HTTP requests to vulnerable endpoints.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to vulnerable Confluence instance · Vulnerable endpoint exposed
nomisec
WRITEUP
1 stars
by nizar0x1f · poc
https://github.com/nizar0x1f/CVE-2021-26084-patch-
This repository provides a patch script for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. The script applies mitigations by modifying specific Velocity template files to prevent exploitation.
Classification
Writeup 90%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Access to the Confluence installation directory · Bash environment · zip/unzip utilities
nomisec
WORKING POC
1 stars
by TheclaMcentire · remote
https://github.com/TheclaMcentire/CVE-2021-26084_Confluence
This repository contains a functional exploit for CVE-2021-26084, an OGNL injection vulnerability in Confluence allowing pre-authentication remote code execution. The exploit leverages a crafted payload to execute arbitrary commands or deploy a JSP webshell.
Classification
Working Poc 100%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Vulnerable version of Confluence
nomisec
WORKING POC
1 stars
by GlennPegden2 · remote
https://github.com/GlennPegden2/cve-2021-26084-confluence
This repository contains a functional exploit for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. The PoC leverages a crafted payload to achieve remote code execution (RCE) via the `createpage-entervariables.action` endpoint, requiring a valid session ID and space key.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
Auth required
Prerequisites:
Valid JSESSIONID cookie · Valid space key · Access to the target Confluence instance
nomisec
WORKING POC
1 stars
by bcdannyboy · remote
https://github.com/bcdannyboy/CVE-2021-26084_GoPOC
This repository contains a functional Go-based PoC for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. The exploit sends crafted HTTP POST requests to execute arbitrary commands via OGNL expressions, leveraging the ScriptEngineManager for code execution.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Vulnerable endpoint exposed
nomisec
WORKING POC
1 stars
by prettyrecon · poc
https://github.com/prettyrecon/CVE-2021-26084_Confluence
This repository contains a functional Python exploit for CVE-2021-26084, a pre-authentication OGNL injection vulnerability in Confluence. The exploit sends a crafted POST request to trigger remote code execution via JavaScript engine manipulation.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Vulnerable version of Confluence
nomisec
SCANNER
by quesodipesto · poc
https://github.com/quesodipesto/conflucheck
The repository contains a Python script that checks for the presence of CVE-2021-26084 by detecting vulnerable Confluence versions via network requests. It does not exploit the vulnerability but scans for it by parsing version numbers from HTTP responses.
Classification
Scanner 95%
Target:
Atlassian Confluence (versions < 6.13.23, 6.14.0-7.4.11, 7.5.0-7.11.6, 7.12.0-7.12.5)
No auth needed
Prerequisites:
Network access to the target Confluence instance
nomisec
WRITEUP
by wdjcy · poc
https://github.com/wdjcy/CVE-2021-26084
This repository provides a technical writeup and vulnerable environment setup for CVE-2021-26084, an OGNL injection vulnerability in Confluence Server. It includes references, setup instructions, and a Docker Compose file to deploy a vulnerable instance.
Classification
Writeup 90%
Target:
Atlassian Confluence Server 7.4.10
No auth needed
Prerequisites:
Docker environment · Confluence Server test license
nomisec
WORKING POC
by attacker-codeninja · poc
https://github.com/attacker-codeninja/CVE-2021-26084
This repository contains a functional exploit for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. The exploit sends crafted HTTP requests to multiple endpoints, leveraging OGNL injection to execute arbitrary commands (e.g., exfiltrating /etc/hosts via a collaborator server).
Classification
Working Poc 95%
Target:
Atlassian Confluence Server/Data Center (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to vulnerable Confluence instance · Python environment with 'requests' library
nomisec
STUB
by wolf1892 · poc
https://github.com/wolf1892/confluence-rce-poc
The repository provides a Docker Compose setup for Confluence and PostgreSQL but lacks actual exploit code or technical details for CVE-2021-26084. It only includes a basic environment configuration.
Target:
Atlassian Confluence Server 7.3
No auth needed
Prerequisites:
Docker environment · Confluence and PostgreSQL images
nomisec
STUB
by p0nymc1 · poc
https://github.com/p0nymc1/CVE-2021-26084
The repository contains only a minimal README with the CVE identifier and no exploit code or technical details. It is a placeholder with no functional content.
Target:
unknown
No auth needed
nomisec
WORKING POC
by Xc1Ym · remote
https://github.com/Xc1Ym/cve_2021_26084
This PoC exploits CVE-2021-26084, an OGNL injection vulnerability in Confluence Server, allowing remote command execution via crafted HTTP requests. The script constructs a malicious payload using JavaScript engine invocation to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Atlassian Confluence Server
No auth needed
Prerequisites:
Network access to vulnerable Confluence instance
nomisec
STUB
by 30579096 · poc
https://github.com/30579096/Confluence-CVE-2021-26084
The repository contains only a minimal Python file with an import statement and no functional exploit code. It lacks any implementation details or payload for CVE-2021-26084.
Target:
Atlassian Confluence
No auth needed
nomisec
WORKING POC
by maskerTUI · remote
https://github.com/maskerTUI/CVE-2021-26084
This repository contains a functional Python exploit for CVE-2021-26084, an OGNL injection vulnerability in Confluence Server. The exploit allows unauthenticated remote code execution by injecting malicious OGNL expressions via the queryString parameter.
Classification
Working Poc 95%
Target:
Atlassian Confluence Server < 7.12.5
No auth needed
Prerequisites:
Target must be running a vulnerable version of Confluence Server · Network access to the target
nomisec
WORKING POC
by smallpiggy · remote
https://github.com/smallpiggy/cve-2021-26084-confluence
This repository contains a functional exploit for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. The exploit allows remote command execution by leveraging a crafted payload in the 'queryString' parameter.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions before 6.13.23, 7.4.11, 7.11.6, 7.12.5)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Target must be vulnerable to CVE-2021-26084
nomisec
WORKING POC
by CrackerCat · poc
https://github.com/CrackerCat/CVE-2021-26084
This repository contains a functional exploit for CVE-2021-26084, an OGNL injection vulnerability in Atlassian Confluence. The script checks for vulnerable endpoints and allows command execution via a crafted payload.
Classification
Working Poc 95%
Target:
Atlassian Confluence (versions before 6.13.23, 7.4.11, 7.11.6, 7.12.5, 7.13.0)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Vulnerable Confluence version
nomisec
WORKING POC
by b1gw00d · poc
https://github.com/b1gw00d/CVE-2021-26084
This repository contains a functional exploit for CVE-2021-26084, a remote code execution vulnerability in Confluence Server and Data Center. The exploit leverages a template injection flaw to execute arbitrary commands via a crafted HTTP POST request.
Classification
Working Poc 95%
Target:
Atlassian Confluence Server and Data Center (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Vulnerable version of Confluence Server/Data Center
nomisec
SCANNER
by Osyanina · poc
https://github.com/Osyanina/westone-CVE-2021-26084-scanner
This repository contains a scanner for detecting CVE-2021-26084 vulnerabilities. The README provides minimal information, indicating it is a detection tool rather than an exploit.
Classification
Scanner 90%
Target:
unknown
No auth needed
vulncheck_xdb
WORKING POC
remote
https://github.com/sma11new/PocList
The repository contains a functional exploit for CVE-2021-26084 (Confluence RCE) and other vulnerabilities, including Apache Druid arbitrary file read (CVE-2021-36749). The code demonstrates the ability to exploit the vulnerability by sending crafted HTTP requests to read arbitrary files or execute commands.
Classification
Working Poc 95%
Target:
Confluence (CVE-2021-26084), Apache Druid (CVE-2021-36749)
No auth needed
Prerequisites:
Network access to the target server · Target running vulnerable software
vulncheck_xdb
WORKING POC
remote
https://github.com/httpvoid/CVE-Reverse
The repository contains functional exploit code for multiple CVEs, including CVE-2021-26084, which is an OGNL injection vulnerability in Atlassian Confluence leading to remote code execution. The provided PHP script demonstrates the exploit by crafting a malicious payload that triggers command execution via JavaScript engine manipulation.
Classification
Working Poc 95%
Target:
Atlassian Confluence
No auth needed
Prerequisites:
Access to the target Confluence instance · Network connectivity to the target
metasploit
WORKING POC
EXCELLENT
by Benny Jacob, Jang, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/atlassian_confluence_webwork_ognl_injection.rb
This Metasploit module exploits an OGNL injection vulnerability in Atlassian Confluence's WebWork component to execute arbitrary commands as the Tomcat user. It supports multiple platforms and payload types, including Unix/Linux and Windows targets.
Classification
Working Poc 100%
Target:
Atlassian Confluence (versions affected by CVE-2021-26084)
No auth needed
Prerequisites:
Network access to the target Confluence instance · Vulnerable version of Atlassian Confluence