为您找到"
doenterpagevariables.action
"相关结果约100,000,000个
The following is a sample action entry for the doenterpagevariables action: In the above example, the doEnter() method of the com.atlassian.confluence.pages.actions.PageVariablesAction class handles requests to doenterpagevariables.action and will return values such as "success", "input";, or "error". This results in the appropriate Velocity ...
Thus, when the attacker accessed /pages/doenterpagevariables.action on a vulnerable Confluence server (note that this did not need authentication), the server used this template to render the page. Both tags processed the appropriate user input as OGNL before putting the results into the generated HTML.
So for example, simply visiting /pages/doenterpagevariables.action should render the velocity template file which was modified i.e. createpage-entervariables.vm. Remember that any route that renders this template would cause the vulnerability exist completely unauth regardless of you turning on Sign up feature.
The Confluence codebase was searched for velocity files matching a regex pattern that had a webwork tag and $ in it's attribute. Once the velocity file was identified the corresponding action class that used the velocity template was identified by browsing through the xwork configuration file viz xwork.xml ( inside confluence-x.y.z.jar) .
That page notes that they've also been hitting the URI /pages/doenterpagevariables.action, which is related to CVE-2021-26084 - another Atlassian Confluence vulnerability. I pulled all their traffic for the past 7 days to see what else they're up to. Other than the vulnerability in question (CVE-2023-22527), we saw two other exploits being ...
Hi all, our Confluence site went down earlier today but came back up following an application restart. In looking through the logs, I found multiple entries that raised my antennae a bit: 2022-02-06 06:01:40,150 ERROR [http-nio-8090-exec-5001 url: /pages/createpage-entervariables.action] [confluenc...
The vulnerability is an Object-Graph Navigation Language (OGNL) injection in one of Confluence's "Velocity" (templating engine) templates that could be triggered by accessing "/pages/createpage-entervariables.action" and potentially other URLs as well. Some proof-of-concept (PoC) exploits and our data suggest additional URLs, although ...
/pages/doenterpagevariables.action. This is a pre-auth exploit, executing 233*233: POST /pages/doenterpagevariables.action HTTP/1.1 Host: your-ip:8090 Accept-Encoding: gzip, deflate Accept: */* Accept-Language: en User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87..4280.88 Safari/537.36 ...
1. It sends a crafted HTTP POST request to "pages/createpage-entervariables.action" and/or "pages/doenterpagevariables.action" to check if the target is vulnerable. 2. If the aforementioned technique doesn't work, it checks for the vulnerable version of Atlassian Confluence using a GET request to the login.action page. Confirmation
Checking createpage-entervariables.vm file. In the form, we see the doenterpagevariables.action action in