RiskVulnerability

Critical RCE Confluence Server CVE-2022-26134

Here are again, Atlassian has made us all aware of the current active exploitation of a critical severity unauthenticated remote code execution vulnerability in Confluence Data Center and Server and full disclosure hasn’t been released for CVE-2022-26134. Metasploit has released a plugin and active POC exists for testing purposes only. OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance.

Date: June 3rd 2022

Updated: June 4th 2022

Risk: Critical

Severity: Critical

Affected Products

  • Confluence Server
  • Confluence Data Center

Remediation

Atlassian has released a patch for all versions of Confluence after version 1.3.0

Fix Version

  • 7.4.17
  • 7.13.7
  • 7.14.3
  • 7.15.2
  • 7.16.4
  • 7.17.4
  • 7.18.1

You can find the complete update and remediation instructions published on Atlassian’s website

Palo Alto has released Version 8577 of Applications and Threats Content to cover critical vulnerability in Atlassian Confluence (CVE-2022-26134) that is being actively exploited in the wild.

SeverityIDAttack NameCVE IDCategoryDefault ActionMinimum PAN-OS VersionMaximum PAN-OS Version
critical92632Atlassian Confluence Remote Code Execution VulnerabilityCVE-2022-26134code-executionreset-server8.1.0

We continue to recommend a Defence in Depth approach where WAF and Next-Generation Firewall is being used as a layered defence approach. Maintaining the suggested WAF below can only enhance security.

${

I also suggest you review your logs given this is a JNDI syntax reference the scope or history of this zero-day is still unknown and how long this has been actively exploited. The following Indicators of Compromise have been identified and the source can be found here

IP Address

156.146.34.46ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
156.146.34.9ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
156.146.56.136ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
198.147.22.148ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
45.43.19.91ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
66.115.182.102ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
66.115.182.111ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
67.149.61.16ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
154.16.105.147ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
64.64.228.239ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
156.146.34.52ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
154.146.34.145ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
221.178.126.244ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
59.163.248.170ipaddressIP observed interacting with or exploiting Confluence servers in May 2022
98.32.230.38ipaddressIP observed interacting with or exploiting Confluence servers in May 2022

Chopper Webshell

Filename<redacted>.jsp
File Size8624 bytes
MD5ea18fb65d92e1f0671f23372bacf60e7
SHA180b327ec19c7d14cc10511060ed3a4abffc821af

File Upload Webshell

Filenamenoop.jsp
File Size537 bytes
MD5f8df4dd46f02dc86d37d46cf4793e036
SHA14c02c3a150de6b70d6fca584c29888202cc1deef

Reference

https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html

https://www.cisa.gov/uscert/ncas/current-activity/2022/06/02/atlassian-releases-security-updates-confluence-server-and-data

https://github.com/Nwqda/CVE-2022-26134