# Automated Exploitation of CVE-2023-22515 - Confluence Privilege Escalation
This repository contains an automated exploit script for CVE-2023-22515, a critical vulnerability in Atlassian Confluence that allows unauthorized attackers to create administrative accounts and gain full control of vulnerable instances. The script supports both single-target and mass exploitation modes, making it suitable for penetration testers and security researchers.
# Features
- **Automated Exploitation** – Fully automated process for triggering the vulnerability and creating an admin account.
- **Single & Mass Exploitation** – Supports targeting a single URL or scanning multiple targets from a file.
- **Multi-threaded Execution** – Uses threading for faster mass exploitation.
- **Rich Output** – Provides detailed responses with user authentication details.
# Requirements
- Python 3.x
- `requests`, `rich`, `alive-progress`, `fire`
# Usage
- **Single Target Exploitation**: ```python exploit.py normal http://target-ip```
- **Multiple Target Exploitation**: ```python exploit.py mass targets.txt ```
# Disclaimer
This tool is intended for **educational and authorized penetration testing** only. Unauthorized use against systems you do not own is illegal.
[4.0K] /data/pocs/e19059d9a1e81d4ddae1d5bbfae2b3ac9ea2b32e
├── [4.4K] exploit.py
└── [1.2K] README.md
0 directories, 2 files