Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Atlassian | Confluence Data Center | < 8.0.0 | - | |
| Atlassian | Confluence Server | < 8.0.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence | https://github.com/ErikWynter/CVE-2023-22515-Scan | POC Details |
| 2 | Poc for CVE-2023-22515 | https://github.com/j3seer/CVE-2023-22515-POC | POC Details |
| 3 | CVE-2023-22515: Confluence Broken Access Control Exploit | https://github.com/Chocapikk/CVE-2023-22515 | POC Details |
| 4 | Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具 | https://github.com/ad-calcium/CVE-2023-22515 | POC Details |
| 5 | CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server | https://github.com/kh4sh3i/CVE-2023-22515 | POC Details |
| 6 | Confluence未授权添加管理员用户漏洞利用脚本 | https://github.com/sincere9/CVE-2023-22515 | POC Details |
| 7 | Confluence Data Center & Server 权限提升漏洞 Exploit | https://github.com/Le1a/CVE-2023-22515 | POC Details |
| 8 | Confluence Broken Access Control | https://github.com/Vulnmachines/confluence-cve-2023-22515 | POC Details |
| 9 | iveresk-CVE-2023-22515 | https://github.com/iveresk/CVE-2023-22515 | POC Details |
| 10 | Confluence后台rce | https://github.com/youcannotseemeagain/CVE-2023-22515_RCE | POC Details |
| 11 | cve-2023-22515的python利用脚本 | https://github.com/DsaHen/cve-2023-22515-exp | POC Details |
| 12 | CVE-2023-22515 (Confluence Broken Access Control Exploit) | https://github.com/joaoviictorti/CVE-2023-22515 | POC Details |
| 13 | CVE-2023-22515 | https://github.com/C1ph3rX13/CVE-2023-22515 | POC Details |
| 14 | CVE-2023-22515 | https://github.com/AIex-3/confluence-hack | POC Details |
| 15 | Server Broken Access Control in Confluence - CVE-2023-22515 | https://github.com/LucasPDiniz/CVE-2023-22515 | POC Details |
| 16 | 配合 CVE-2023-22515 后台上传jar包实现RCE | https://github.com/aaaademo/Confluence-EvilJar | POC Details |
| 17 | None | https://github.com/edsonjt81/CVE-2023-22515-Scan. | POC Details |
| 18 | Confluence broken access control to code execution | https://github.com/INTfinityConsulting/cve-2023-22515 | POC Details |
| 19 | A simple exploit for CVE-2023-22515 | https://github.com/CalegariMindSec/Exploit-CVE-2023-22515 | POC Details |
| 20 | Atlassian Confluence Data Center and Server Broken Access Control Vulnerability | https://github.com/rxerium/CVE-2023-22515 | POC Details |
| 21 | NSE script for checking the presence of CVE-2023-22515 | https://github.com/fyx1t/NSE--CVE-2023-22515 | POC Details |
| 22 | This script will inform the user if the Confluence instance is vulnerable, but it will not proceed with the exploitation steps. | https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check | POC Details |
| 23 | NSE script to check if app is vulnerable to cve-2023-22515 | https://github.com/xorbbo/cve-2023-22515 | POC Details |
| 24 | Vulnerability checking tool via Nmap Scripting Engine | https://github.com/spareack/CVE-2023-22515-NSE | POC Details |
| 25 | CVE 2023-22515 | https://github.com/Onedy1703/CVE-2023-22515 | POC Details |
| 26 | CVE 2023-22515 | https://github.com/Onedy1703/CVE-2023-22515-Confluence | POC Details |
| 27 | None | https://github.com/vivigotnotime/CVE-2023-22515-Exploit-Script | POC Details |
| 28 | Atlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-22515.yaml | POC Details |
| 29 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Confluence%20server-info.action%20%E5%B1%9E%E6%80%A7%E8%A6%86%E7%9B%96%E5%AF%BC%E8%87%B4%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2023-22515.md | POC Details |
| 30 | https://github.com/vulhub/vulhub/blob/master/confluence/CVE-2023-22515/README.md | POC Details | |
| 31 | CVE-2023-22515 (Confluence Broken Access Control Exploit) | https://github.com/killvxk/CVE-2023-22515-joaoviictorti | POC Details |
| 32 | Confluence未授权添加管理员用户漏洞利用脚本 | https://github.com/K4ptor/CVE-2023-22515 | POC Details |
| 33 | I was presented with a high-severity alert indicating a potential exploit attempt of CVE-2023-22515, a zero-day vulnerability in Atlassian Confluence. The alert showed a suspicious GET request from an external IP targeting the Confluence server, suggesting an attempt to gain unauthorised admin access. | https://github.com/Arkha-Corvus/LetsDefend-SOC235-Atlassian-Confluence-Broken-Access-Control-0-Day-CVE-2023-22515-EventID-197 | POC Details |
| 34 | Hands-on security lab demonstrating CVE-2023-22515 — Atlassian Confluence Authentication Bypass using a simulated vulnerable environment. | https://github.com/CyberSentinel321/cve-2023-22515-lab | POC Details |
| 35 | Confluence CVE-2023-22515 - Create admin account | https://github.com/radzek15/CVE-2023-22515 | POC Details |
| 36 | None | https://github.com/tranphuc2005/CVE-2023-22515 | POC Details |
| 37 | None | https://github.com/dkq-k/CVE-2023-22515 | POC Details |
| 38 | None | https://github.com/dkq-k/cve-2023-22515-1 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet