POC详情: aed6de148bda55144d6359980bb06d364e6ea844

来源
关联漏洞
标题: Atlassian Confluence Data Center 和 Confluence Server 安全漏洞 (CVE-2023-22518)
描述:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Data Center 和 Confluence Server存在安全漏洞,该漏洞源于授权管理不当。
描述
An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization
介绍
# CVE-2023-22518
An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization Vulnerability

## Installation:

```bash
git clone https://github.com/sanjai-AK47/CVE-2023-22518
cd CVE-2023-22518
python3 exploit.py
```

## Usage:

```bash
python3 exploit.py -h                                                                                 
usage: exploit.py [-h] [-d DOMAIN] [-dL DOMAINS_LIST] [-o OUTPUT] [-to TIME_OUT] [-px PROXY] [-v]

[DESCTIPTION]: Exploitation and Detection tool for Cisco CVE-2023-46747

options:
  -h, --help            show this help message and exit
  -d DOMAIN, --domain DOMAIN
                        [INFO]: Target domain for exploiting without protocol eg:(www.domain.com)
  -dL DOMAINS_LIST, --domains-list DOMAINS_LIST
                        [INFO]: Targets domain for exploiting without protocol eg:(www.domain.com)
  -o OUTPUT, --output OUTPUT
                        [INFO]: File name to save output
  -to TIME_OUT, --time-out TIME_OUT
                        [INFO]: Switiching timeout will requests till for your timeout and also for BURPSUITE
  -px PROXY, --proxy PROXY
                        [INFO]: Switiching proxy will send request to your configured proxy (eg: BURPSUITE)
  -v, --verbose         [INFO]: Switiching Verbose will shows offline targets



```

## Easy POC:

Users can easily make a poc with the Exploiter by giving vulnerable target and make proxy requests using your burpsuite and intercept the request
and the below is a following easy poc making flags.

```bash
python3 exploit.py -d vulnerable.com -o output.txt --proxy 127.0.0.1:8080 --time-out 40
```

## Exploited:
![Screenshot from 2023-11-05 12-36-55](https://github.com/sanjai-AK47/CVE-2023-22518/assets/119435129/dc6495c9-44b5-4c58-91f6-8a15102d9560)




## Exploitation:

When the script exploits the vulnerability it will show the vulnerable output and server path of the targets

## Information:

Important thing if any unethical exploitation the I'm not responsible for any illegal actions so plese use this for ethical and legal purposes

Proof of conept Developed by [D.Sanjai Kumar](https://www.linkedin.com/in/d-sanjai-kumar-109a7227b/) with ♥️ for any upgrade and miscoded contact me throguh my [LinkedIn](https://www.linkedin.com/in/d-sanjai-kumar-109a7227b/). Thank you!
文件快照

[4.0K] /data/pocs/aed6de148bda55144d6359980bb06d364e6ea844 ├── [ 12K] exploit.py ├── [1.0K] LICENSE ├── [2.3K] README.md └── [ 73] requirements.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。