Free

CVE Series: Confluence RCE (CVE-2022-26134)

CVE-2022-26134 is an Object-Graph Navigation Language (OGNL) injection flaw impacting Atlassian Confluence & Data Center software. Leveraging this remote code injection (RCE) flaw, adversaries can execute arbitrary code on a server. Atlassian tools are popular with more remote work, so mitigation is key. Exploit, detect, & mitigate this flaw!
1
20
M
Time
intermediate
difficulty
2
ceu/cpe

Course Content

Hands-on Exploitation

0m

Confluence RCE CVE Exploitation
Mitigation

5m

Confluence RCE CVE Detection and Mitigation
Detection

5m

Confluence RCE CVE Detection and Mitigation
Course Description

Who should take this course?

This course is for seasoned red teamers, penetration testers, security and vulnerability assessment analysts, and system administrators who want to know how to exploit and protect against the latest vulnerabilities impacting enterprise systems.

What are the prerequisites for this course?

Before taking this course, we recommend that you have basic knowledge of Python as a programming language, as well as functional knowledge of web applications.

Why take this course?

What makes this vulnerability so dangerous is anyone who is able to contact the server can perform RCE using OGNL. What is even more concerning is incident response companies, such as Volexity, have seen active exploitation of this vulnerability in the wild. Attackers can write to victim servers and allow them to perform malicious actions. With the wide use of Confluence, it is imperative that defenders act quickly to patch their servers and determine if any malicious actors exploited this vulnerability.

What makes this course different from others?

By the end of this course, you should be able to:

  • Define the vulnerability, describe its root cause, and communicate its significance to key organizational stakeholders.
  • Exploit this vulnerability using publicly available exploit code.
  • Execute various mitigation tactics to reduce risk.
  • Your instructor, Clint Kehr, is a technical manager for a financial services company’s Responsible Disclosure Team, where he interacts with ethical hackers who find vulnerabilities in the company’s infrastructure. Clint is a former Special Agent with the Department of Justice, where he specialized in internet investigations and conducted numerous cases on cyber threat actors on the surface, deep, and dark web, resulting in Clint earning the Attorney General’s Distinguished Service Award.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Senior Instructor
    Clint Kehr

    Clint is a technical manager for a financial services company’s Responsible Disclosure Team, where he interacts with ethical hackers who find vulnerabilities in the company’s infrastructure. Clint is a former Special Agent with the Department of Justice where he specialized in internet investigations and conducted numerous cases on cyber threat actors on the surface, deep, and dark web, resulting in Clint earning the Attorney General’s Distinguished Service Award. Clint has trained over 1,000 law enforcement officers, prosecutors, and civilians on the dark web and dark market websites. Clint has a master’s degree in intelligence studies from American Military University where he graduated with honors and also has a master’s degree in Information Technology from Carnegie Mellon University where he graduated with highest distinction. As a former Navy Reserve Officer, Clint served in many roles, such as a division officer and department head for commands in the information warfare community.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a CVE Series: Confluence RCE (CVE-2022-26134) Certificate of Completion