Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-22515 PoC — Atlassian Confluence Server 安全漏洞

Source
Associated Vulnerability
Title:Atlassian Confluence Server 安全漏洞 (CVE-2023-22515)
Description:Atlassian Confluence Server是澳大利亚Atlassian公司的一套具有企业知识管理功能,并支持用于构建企业WiKi的协同软件的服务器版本。 Atlassian Confluence Server存在安全漏洞,该漏洞源于外部攻击者可能利用可公开访问的Confluence Data Center和Confluence Serve,用未知的漏洞来创建Confluence 管理员帐户并访问 Confluence 实例。
Readme
# Automated Exploitation of CVE-2023-22515 - Confluence Privilege Escalation
This repository contains an automated exploit script for CVE-2023-22515, a critical vulnerability in Atlassian Confluence that allows unauthorized attackers to create administrative accounts and gain full control of vulnerable instances. The script supports both single-target and mass exploitation modes, making it suitable for penetration testers and security researchers.
# Features
- **Automated Exploitation** – Fully automated process for triggering the vulnerability and creating an admin account.
- **Single & Mass Exploitation** – Supports targeting a single URL or scanning multiple targets from a file.
- **Multi-threaded Execution** – Uses threading for faster mass exploitation.
- **Rich Output** – Provides detailed responses with user authentication details.
# Requirements
- Python 3.x
- `requests`, `rich`, `alive-progress`, `fire`
# Usage
- **Single Target Exploitation**: ```python exploit.py normal http://target-ip```
- **Multiple Target Exploitation**: ```python exploit.py mass targets.txt ```
# Disclaimer
This tool is intended for **educational and authorized penetration testing** only. Unauthorized use against systems you do not own is illegal. 
File Snapshot

[4.0K] /data/pocs/e19059d9a1e81d4ddae1d5bbfae2b3ac9ea2b32e ├── [4.4K] exploit.py └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.