CVE-2022-26134 Confluence: Emulation and Detection
In this lab, you’ll practice verifying vulnerabilities and implementing protective security controls. When you’re finished with this lab, you’ll have a basic understanding of protecting Confluence servers against CVE-2022-26134.
Terms and conditions apply.
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!
Setup: Configure A Test Confluence Server
You will finalize the configuration of a test Confluence Server to validate exploitation of the CVE-2022-26134 vulnerability.
Emulation: Verify Confluence Server Vulnerability to CVE-2022-26134
In this challenge, you'll review the bug bounty hunter’s report verifying legitimacy and existence of the critical vulnerability. You’ll learn how to identify an Object-Graph Navigation Language (OGNL) injection and use the attack technique to gain access to the host operating system.
Detection: Find Indicators of Attempted CVE-2022-26134 Exploitation
In this challenge, you’ll review the Confluence server application logs and packet capture to understand what (if any) indicators of compromise are created by abusing the vulnerability identified in the previous challenge.
Protection: Alert on CVE-2022-26134 Attack Attempts
In this challenge, you’ll use knowledge gained in the two previous challenges to make a risk-based decision on how to best mitigate the vulnerability. You’ll assume that a patch is not currently available, and the application cannot be turned off as it’s hosting a necessary business function.
Bonus: Taking It One Step Further
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
- Linux Network and Host Security
- Network Security Monitoring with Suricata
- Java Web Fundamentals