POC详情: e19059d9a1e81d4ddae1d5bbfae2b3ac9ea2b32e

来源
关联漏洞
标题: Atlassian Confluence Server 安全漏洞 (CVE-2023-22515)
描述:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server存在安全漏洞,该漏洞源于外部攻击者可能利用可公开访问的Confluence Data Center和Confluence Serve,用未知的漏洞来创建Confluence 管理员帐户并访问 Confluence 实例。
介绍
# Automated Exploitation of CVE-2023-22515 - Confluence Privilege Escalation
This repository contains an automated exploit script for CVE-2023-22515, a critical vulnerability in Atlassian Confluence that allows unauthorized attackers to create administrative accounts and gain full control of vulnerable instances. The script supports both single-target and mass exploitation modes, making it suitable for penetration testers and security researchers.
# Features
- **Automated Exploitation** – Fully automated process for triggering the vulnerability and creating an admin account.
- **Single & Mass Exploitation** – Supports targeting a single URL or scanning multiple targets from a file.
- **Multi-threaded Execution** – Uses threading for faster mass exploitation.
- **Rich Output** – Provides detailed responses with user authentication details.
# Requirements
- Python 3.x
- `requests`, `rich`, `alive-progress`, `fire`
# Usage
- **Single Target Exploitation**: ```python exploit.py normal http://target-ip```
- **Multiple Target Exploitation**: ```python exploit.py mass targets.txt ```
# Disclaimer
This tool is intended for **educational and authorized penetration testing** only. Unauthorized use against systems you do not own is illegal. 
文件快照

[4.0K] /data/pocs/e19059d9a1e81d4ddae1d5bbfae2b3ac9ea2b32e ├── [4.4K] exploit.py └── [1.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。