关联漏洞
标题:
Atlassian Confluence Server 安全漏洞
(CVE-2023-22515)
描述:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server存在安全漏洞,该漏洞源于外部攻击者可能利用可公开访问的Confluence Data Center和Confluence Serve,用未知的漏洞来创建Confluence 管理员帐户并访问 Confluence 实例。
介绍
# Automated Exploitation of CVE-2023-22515 - Confluence Privilege Escalation
This repository contains an automated exploit script for CVE-2023-22515, a critical vulnerability in Atlassian Confluence that allows unauthorized attackers to create administrative accounts and gain full control of vulnerable instances. The script supports both single-target and mass exploitation modes, making it suitable for penetration testers and security researchers.
# Features
- **Automated Exploitation** – Fully automated process for triggering the vulnerability and creating an admin account.
- **Single & Mass Exploitation** – Supports targeting a single URL or scanning multiple targets from a file.
- **Multi-threaded Execution** – Uses threading for faster mass exploitation.
- **Rich Output** – Provides detailed responses with user authentication details.
# Requirements
- Python 3.x
- `requests`, `rich`, `alive-progress`, `fire`
# Usage
- **Single Target Exploitation**: ```python exploit.py normal http://target-ip```
- **Multiple Target Exploitation**: ```python exploit.py mass targets.txt ```
# Disclaimer
This tool is intended for **educational and authorized penetration testing** only. Unauthorized use against systems you do not own is illegal.
文件快照
[4.0K] /data/pocs/e19059d9a1e81d4ddae1d5bbfae2b3ac9ea2b32e
├── [4.4K] exploit.py
└── [1.2K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。