Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-22524 PoC — Atlassian Companion app 安全漏洞

Source
Associated Vulnerability
Title:Atlassian Companion app 安全漏洞 (CVE-2023-22524)
Description:Atlassian Companion app是澳大利亚Atlassian公司的一款使用户可以在其首选的桌面应用中编辑Confluence文件的应用程序。 Atlassian Companion app 2.0.0之前版本存在安全漏洞,该漏洞源于存在远程代码执行漏洞。
Readme
# Atlassian Companion RCE Vulnerability Proof of Concept (CVE-2023-22524)

## Overview

This repository contains a proof of concept (PoC) for the recently discovered remote code execution vulnerability in Atlassian Companion for macOS, identified as CVE-2023-22524. This critical issue allows attackers to bypass the app's blocklist and macOS Gatekeeper, leading to potential execution of harmful code.

## Details

The vulnerability stems from an oversight in the application's handling of certain file types and its interaction with macOS security features. For a detailed analysis of the vulnerability, including the discovery process and technical specifics, please refer to our comprehensive blog post on the [Imperva Threat Research Blog](https://www.imperva.com/blog/?category=labs)

## Steps to Reproduce

1. Atlassian Companion < 2.0.0 is required.
2. Clone this repository, navigate to the `PoC` directory, and run `node server.js`.
3. Visit `http://localhost:8080/example.html` in your browser and follow the instructions.

## Additional Information

- [Imperva Threat Research Blog](https://www.imperva.com/blog/cve-2023-22524-rce-vulnerability-in-atlassian-companion-for-macos/)
- [Atlassian's Security Advisory](https://confluence.atlassian.com/security/cve-2023-22524-rce-vulnerability-in-atlassian-companion-app-for-macos-1319249492.html)

## Disclaimer

The information provided here is for educational and research purposes only. The authors are not responsible for any misuse of this information.
File Snapshot

[4.0K] /data/pocs/27866ea0c9afabd0c9210dc786379f1c4e5c1a09 ├── [4.0K] PoC │   ├── [ 594] example.html │   ├── [5.8K] index.html │   ├── [1.6K] server.js │   └── [ 36K] test.zip └── [1.5K] README.md 1 directory, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.