.. / CVE-2019-3398

Exploit for Atlassian Confluence Download Attachments - Remote Code Execution (CVE-2019-3398)

Description:

Confluence Server and Data Center had a path traversal vulnerability in the downloadallattachments resource. A remote attacker who has permission to add attachments to pages and / or blogs or to create a new space or a personal space or who has ‘Admin’ permissions for a space can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Confluence Server or Data Center.

Nuclei Template

View the template here CVE-2019-3398.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2019/CVE-2019-3398.yaml
Copy

References:

https://blogs.juniper.net/en-us/threat-research/cve-2019-3398-atlassian-confluence-download-attachments-remote-code-execution
http://packetstormsecurity.com/files/155245/Atlassian-Confluence-6.15.1-Directory-Traversal.html
https://nvd.nist.gov/vuln/detail/CVE-2019-3398
http://packetstormsecurity.com/files/152616/Confluence-Server-Data-Center-Path-Traversal.html
https://jira.atlassian.com/browse/CONFSERVER-58102