9.8
CVSSv3

CVE-2023-22515

Published: 04/10/2023 Updated: 16/02/2024
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian confluence server

atlassian confluence data center

Exploits

This Metasploit module exploits an improper input validation issue in Atlassian Confluence, allowing arbitrary HTTP parameters to be translated into getter/setter sequences via the XWorks2 middleware and in turn allows for Java objects to be modified at run time The exploit will create a new administrator user and upload a malicious plugins to get ...
This Metasploit module exploits a broken access control vulnerability in Atlassian Confluence servers leading to an authentication bypass A specially crafted request can be create new admin account without authentication on the target Atlassian server ...

Github Repositories

Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具

红队工具-Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具 漏洞影响范围 800 <= Confluence Data Center and Confluence Server <= 804 810 <= Confluence Data Center and Confluence Server <= 814 820 <= Confluence Data Center and Confluence Server <= 823 830 <= Confluence Data Center and

Confluence Data Center & Server 权限提升漏洞 Exploit

CVE-2023-22515 Confluence Data Center & Server 权限提升漏洞 Exploit 使用方法 python3 CVE-2023-22515py url username password 免责声明 检测工具仅供各大安全公司的安全测试员安全测试使用。未经允许请勿对任何外部计算机系统进行入侵攻击,不得用于任何非授权形式的安

A list of all of my starred repos, automated using Github Actions 🌟

awesome stars A list of awesome repositories I've starred Want your own? Try: stargazer Total starred repositories: 272 Contents Astro Batchfile C C# C++ CSS Dart Dockerfile Elixir Go HCL HTML Java JavaScript PHP PowerShell Python Ruby Rust Sass Scala Shell Swift TypeScript Unknown Vue Astro Lissy93/awesome-privacy - 🦄 A curated list of privacy & security-f

CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server

CVE-2023-22515 CVE-2023-22515, a critical vulnerability affecting on-premises instances of Confluence Server and Confluence Data Center, a Broken Access Control vulnerability Attlassian has provided a CVSS base score of 100 One line poc cat filetxt| while read host do;do curl -skL "$host/setup/setupadministratoraction" | grep -i "<title>S

Confluence Broken Access Control

confluence-cve-2023-22515 Confluence Broken Access Control : CVE-2023-22515

Atlassian Confluence Data Center and Server Broken Access Control Vulnerability

CVE-2023-22515 How does this detection method work? This template looks at the following endpoints: - "{{BaseURL}}/dologinaction" - "{{BaseURL}}" - "{{BaseURL}}/pages" - "{{BaseURL}}/confluence" - "{{BaseURL}}/wiki" From these endpoints it will extract the version

Infosec365: A Year-Long Hacking Odyssey Welcome to Infosec365 🚀 Embark on a transformative journey through the realm of cybersecurity with Infosec365—a curated 365-day hacking adventure designed for enthusiasts, novices, and seasoned professionals alike In the spirit of dedication and commitment, this comprehensive plan unfolds week by week, delving into various facet

CVE-2023-22515

Confluence Hack CVE-2023-22515 exploitpy Exploit to create a new admin user Compromised audit log: As a reverence served: packetstormsecuritycom/files/175225/Atlassian-Confluence-Unauthenticated-Remote-Code-Executionhtml and githubcom/Chocapikk/CVE-2023-22515 plugin_shellplugjar This plugin provides a web-based shell interface for executing command-line

配合 CVE-2023-22515 后台上传jar包实现RCE

aaaademo/Confluence-EvilJar 配合 CVE-2023-22515 后台上传jar包实现RCE git clone githubcom/aaaademo/Confluence-EvilJar cd Confluence-EvilJar mvn package CMDshell confluencelocal/plugins/servlet/testbin/cmServlet 哥斯拉webshell连接方式 confluencelocal/plugins/

CVE-2023-22515-Scan About This is simple scanner for CVE-2023-22515, a critical vulnerability in Atlassian Confluence Data Center and Server that is actively being exploited in the wild by threat actors in order "to create unauthorized Confluence administrator accounts and access Confluence instances" The vulnerability was initially described as a "privilege esc

Infosec365: A Year-Long Hacking Odyssey Welcome to Infosec365 🚀 Embark on a transformative journey through the realm of cybersecurity with Infosec365—a curated 365-day hacking adventure designed for enthusiasts, novices, and seasoned professionals alike In the spirit of dedication and commitment, this comprehensive plan unfolds week by week, delving into various facet

Exploit for CVE-2023-22527 - Atlassian Confluence Data Center and Server

CVE-2023-22527 ⚠️ This exploit is for defensive purposes and should be used by cybersecurity professionals to identify possible vulnerable Atlassian Confluence servers Description CVE-2023-22527 - Server-side Template Injection (SSTI) vulnerability allowing Remote Code Execution (RCE) In Confluence Data Center and Confluence Server Products and Versions affected: Produ

CVE-2023-22515 (Confluence Broken Access Control Exploit)

CVE-2023-22515 Overview Compile Usage Running CVE-2023-22515 Overview Confluence is a web-based enterprise wiki developed by Australian software company Atlassian Atlassian has been made aware of an issue reported by some customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence server and data center ins

Server Broken Access Control in Confluence - CVE-2023-22515

Confluence Vulnerability - CVE-2023-22515 📓 Introduction Atlassian was informed about a possible vulnerability that could be exploited and compromising the environment through administrative access On October 4, 2023, Atlassian released a security advisory regarding CVE-2023-22515 which got a CVE of 100 The vulnerability was introduced in version 800 of Confluence Serve

Infosec365: A Year-Long Hacking Odyssey Welcome to Infosec365 🚀 Embark on a transformative journey through the realm of cybersecurity with Infosec365—a curated 365-day hacking adventure designed for enthusiasts, novices, and seasoned professionals alike In the spirit of dedication and commitment, this comprehensive plan unfolds week by week, delving into various facet

CVE-2023-22515

CVE-2023-22515 CVE-2023-22515 Confluence Broken Access Control Exploit 漏洞说明 Confluence 未授权添加管理员用户 USAGE Build # 源码编译 go mod init CVE-2023-22515 go mod tidy go build -ldflags="-s -w" -trimpath -o CVE-2023-22515exe \CVE-2023-22515go Run \CVE-2023-22515exe -h ██████╗

A list of all of my starred repos, automated using Github Actions 🌟

awesome stars A list of awesome repositories I've starred Want your own? Try: stargazer Total starred repositories: 272 Contents Astro Batchfile C C# C++ CSS Dart Dockerfile Elixir Go HCL HTML Java JavaScript PHP PowerShell Python Ruby Rust Sass Scala Shell Swift TypeScript Unknown Vue Astro Lissy93/awesome-privacy - 🦄 A curated list of privacy & security-f

Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence

CVE-2023-22515-Scan About This is simple scanner for CVE-2023-22515, a critical vulnerability in Atlassian Confluence Data Center and Server that is actively being exploited in the wild by threat actors in order "to create unauthorized Confluence administrator accounts and access Confluence instances" The vulnerability was initially described as a "privilege esc

Awvs Scanner、fahai

AWVS Update InfO 本仓库及相关资源仅供个人测试,请勿用于非法用途 This warehouse and related resources are for personal testing only, please do not use them for illegal purposes Latest 239231020153 New security checks New Security Check: CVE-2023-20198 New Security Check: CVE-2023-22515 Improvements Multiple improvements to the SSL Engine Impr

One line vulnerabilities

vuln-liners One line vulnerabilities CVE-2023-38545 curl -vvv -x socks5h://localhost:9050 $(python3 -c "print(('A'*10000), end='')") CVE-2023-22515 (Confluence Broken Access Control) curl -k -X POST -H "X-Atlassian-Token: no-check" --data-raw "username=adm1n&fullName=admin&email=admin@confluence&password=adm1n

CVE-2023-22515 CVE-2023-22515, a critical vulnerability affecting on-premises instances of Confluence Server and Confluence Data Center, a Broken Access Control vulnerability Attlassian has provided a CVSS base score of 100 One line poc cat filetxt| while read host do;do curl -skL "$host/setup/setupadministratoraction" | grep -i "<title>S

iveresk-CVE-2023-22515

1vere$k CVE-2023-22515 iveresk-CVE-2023-22515 On October 4, 2023, Atlassian released an advisory for CVE-2023-22515, a critical vulnerability affecting on-premises instances of Confluence Server and Confluence Data Center Atlassian initially described this vulnerability as a Privilege Escalation, but they have since recategorised it as a Broken Access Control vulnerability He

Poc for CVE-2023-22515

CVE-2023-22515 CVE-2023-22515, a critical vulnerability affecting on-premises instances of Confluence Server and Confluence Data Center, a Broken Access Control vulnerability Attlassian has provided a CVSS base score of 100 Exploit Brief explanation: 1- Due to how Xwork interceptors parses parameters /testaction?one=a equals to setOne()='a' alternatively /testact

CVE-2023-22515: Confluence Broken Access Control Exploit

CVE-2023-22515 Exploit Script 🔐 This script is designed to exploit the CVE-2023-22515 vulnerability in Confluence, which allows for unauthorized access to Confluence Server and Confluence Data Center instances The vulnerability is categorized as a Broken Access Control issue and has a CVSS base score of 100 ⚠️ Prerequisites 💻 Before using this script, make sure you

基于Pocsuite3编写的Poc

POC-Pocsuite3 自用,基于Pocsuite3编写,后续随缘更新 2024 • 金和OA未授权信息泄露 2023 • 海康威视iVMS综合安防系统任意文件上传漏洞 • SolarView_CVE-2023-23333 • Confluence未授权管理用户添加_CVE-2023-22515 Apache • Apache_Struts2_001 • Apache_Struts2_016 • Apache_Struts2_017 • Apache_Struts2_01

A simple exploit for CVE-2023-22515

Exploit CVE-2023-22515 A simple basch script exploit for CVE-2023-22515 Information Confluence Data Center and Server instances have a Broken Access Control Vulnerability (CVE-2023-22515), allowing attackers to create unauthorized Confluence administrator accounts and access Confluence instances Affected Versions 800 801 802 803 804 810 811 813 814 820 82

cve-2023-22515的python利用脚本

cve-2023-22515-exp cve-2023-22515的python利用脚本 参数如下: -h, --help show this help message and exit -H HOST, --host HOST 指定url -U USERNAME, --username USERNAME 指定用户名 -PW PASSWORD, --password PASSWORD 指定密码 -E EMAIL, --email EMAIL 指定邮箱 -P PROXIES, --proxies PROX

Confluence CVE-2023-22518

CVE-2023-22518 Confluence CVE-2023-22518 Description xmlexport-20231127-071916-1zip:Confluence 空备份文件,空备份会导致恢复后丢失全部数据!!! 备份文件可自行替换,置于脚本同级目录即可 shellplugjar:getshell 插件,来源于:githubcom/youcannotseemeagain/CVE-2023-22515_RCE 导出备份文件的接口/setup/setup-res

Checker for CVE-2023-22518 vulnerability on Confluence

CVE-2023-22518 Checker for CVE-2023-22518 and CVE-2023-22515 critical vulnerabilities in Confluence Description This script is designed to check for and exploit vulnerabilities in Atlassian Confluence instances It checks for the vulnerability CVE-2023-22518, and exploits the vulnerability CVE-2023-22515 to create a new administrator account if the instance is vulnerable (usin

Confluence未授权添加管理员用户漏洞利用脚本

CVE-2023-22515 Exploit Script 影响版本 800<=Atlassian Confluence<=851 漏洞利用 随机添加用户名和密码 python3 CVE-2023-22515py -h usage: confluencepy [-h] [-url URL] optional arguments: -h, --help show this help message and exit -url URL 目标url如:xxxxxxxx

Awvs Scanner、fahai

AWVS Update InfO 本仓库及相关资源仅供个人测试,请勿用于非法用途 This warehouse and related resources are for personal testing only, please do not use them for illegal purposes Latest 239231020153 New security checks New Security Check: CVE-2023-20198 New Security Check: CVE-2023-22515 Improvements Multiple improvements to the SSL Engine Impr

NSE script for checking the presence of CVE-2023-22515

NSE script for checking the presence of CVE-2023-22515

Recent Articles

US cybercops urge admins to patch amid ongoing Confluence chaos
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Do it now, no ifs or buts, says advisory

US authorities have issued an urgent plea to network admins to patch the critical vulnerability in Atlassian Confluence Data Center and Server amid ongoing nation-state exploitation. The joint cybersecurity advisory from CISA, FBI, and Multi-State Information Sharing and Analysis Center (MS-ISAC) comes after the October 4 disclosure of CVE-2023-22515, which was assigned a CVSS score of 10 by Atlassian. Given that the potential consequences of a successful exploit could lead attackers to create n...

Stop what you’re doing and patch this critical Confluence flaw, warns Atlassian
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Risk of ‘significant data loss’ for on-prem customers

Atlassian has told customers they “must take immediate action” to address a newly discovered flaw in its Confluence collaboration tool. An advisory issued on October 31st warns of CVE-2023-22518, described as an “improper authorization vulnerability in Confluence Data Center and Server”, the on-prem versions of Atlassian’s products. All versions of Confluence are susceptible to the bug, which Atlassian rates at 9.1/10 severity on the ten-point Common Vulnerability Scoring System. The A...

Atlassian cranks up the threat meter to max for Confluence authorization flaw
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Attackers secure admin rights after vendor said they could only steal data

Atlassian reassessed the severity rating of the recent improper authorization vulnerability in Confluence Data Center and Server, raising the CVSS score from 9.1 to a maximum of 10. The company overhauled its security advisory for CVE-2023-22518 after it realized there had been a "change in the scope of the attack" on Monday. In its original advisory, the Aussie-headquartered vendor said exploitation of the vulnerability by an unauthenticated user could lead to "significant data loss." In the re...

Rust can help make software secure – but it's no cure-all
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Security is a process, not a product. Nor a language

Memory-safety flaws represent the majority of high-severity problems for Google and Microsoft, but they're not necessarily associated with the majority of vulnerabilities that actually get exploited. So while coding with Rust can help reduce memory safety vulnerabilities, it won't fix everything. Security biz Horizon3.ai has analyzed CISA's Known Exploited Vulnerabilities in 2023 and found, as chief attack engineer Zach Hanley put it, that "Rust won’t save us, but it will help us." We feel thi...

IT networks under attack via critical Confluence zero-day. Patch now
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources 'Handful' of customers hit so far, public-facing instances at risk

Atlassian today said miscreants have exploited a critical bug in on-premises instances of Confluence Server and Confluence Data Center to create and abuse admin accounts within the enterprise colab software.   The privilege-escalation vulnerability, tracked as CVE-2023-22515, affects versions 8.0.0 through 8.5.1. Versions prior to 8.0.0 are not impacted by the flaw. Our reading of the details is that public-facing instances are potentially in danger: anyone who can reach a vulnerable d...