Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-22515 PoC — Atlassian Confluence Server 安全漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server 安全漏洞 (CVE-2023-22515)
Description:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server存在安全漏洞,该漏洞源于外部攻击者可能利用可公开访问的Confluence Data Center和Confluence Serve,用未知的漏洞来创建Confluence 管理员帐户并访问 Confluence 实例。
Description
iveresk-CVE-2023-22515
Readme
# 1vere$k CVE-2023-22515
iveresk-CVE-2023-22515  
On October 4, 2023, Atlassian released an advisory for CVE-2023-22515, a critical vulnerability affecting on-premises instances of Confluence Server and Confluence Data Center.  
Atlassian initially described this vulnerability as a Privilege Escalation, but they have since recategorised it as a Broken Access Control vulnerability.  
Here is the [source article](https://attackerkb.com/topics/Q5f0ItSzw5/cve-2023-22515/rapid7-analysis) for it.  
```
echo "----------------Welcome-to-cve-2023-22515-script-by-1veresk------------+";
echo "+----------------------------------------------------------------------+";
echo "+-------------------For-The-Help---------------------------------------+";
echo "Example#1: ./cve-2023-22515.sh -h--------------------------------------+";
echo "+-------------------For-The-URL-Check----------------------------------+";
echo "Example#1: ./cve-2023-22515.sh <TARGET_IP> <LOGIN> <PASSWORD>----------+";
echo "+-------------------For-The-File-Check---------------------------------+";
echo "Example#1: ./cve-2023-22515.sh <TARGET_IP> <LOGIN> <PASSWORD>----------+";
echo "+---The Deafault <LOGIN>=adm1n <PASSWORD>=adm1n------------------------+";
echo "+----------------------------------------------------------------------+";
```
File Snapshot

[4.0K] /data/pocs/3bb7190c84645ef565e4a6867edbaaefe5d99d01 ├── [2.6K] cve-2023-22515.sh ├── [1.0K] LICENSE └── [1.3K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.