关联漏洞
描述
Checker for CVE-2023-22518 vulnerability on Confluence
介绍
# CVE-2023-22518
Checker for CVE-2023-22518 and CVE-2023-22515 critical vulnerabilities in Confluence.
## Description
This script is designed to check for and exploit vulnerabilities in Atlassian Confluence instances. It checks for the vulnerability CVE-2023-22518, and exploits the vulnerability CVE-2023-22515 to create a new administrator account if the instance is vulnerable (using code from [Chocapikk](https://github.com/Chocapikk/CVE-2023-22515))
## Usage Guide:
# Installation:
- Ensure you have Python 3 installed on your machine.
- Install the required libraries using the command:
pip install -r requirements.txt
# Running the script:
- Single Instance Check and Exploit:
- Use the command:
python CVE-2023-22518.py -i <instance-url> -o <output-file>
-Replace <instance-url> with the URL of the Confluence instance you want to check and exploit.
- Replace <output-file> with the name of the file where you want to save any successful exploits. This argument is optional.
For example:
python CVE-2023-22518.py -i https://example.com/confluence -o exploits.txt
## Legal Disclaimer:
This script is intended for educational and authorized testing purposes only. The user is responsible for ensuring that they have the necessary permissions to engage in testing activities on the target Confluence instance(s). Unauthorized access to computer systems is illegal, and users should ensure compliance with all applicable laws and regulations. The developer(s) assume no liability and are not responsible for any misuse or damage caused by this script.
文件快照
[4.0K] /data/pocs/2544d595d50b065ec754903909b69646f205a25d
├── [7.7K] CVE-2023-22518.py
├── [ 34K] LICENSE
├── [1.5K] README.md
└── [ 69] requirements.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。