NA

CVE-2023-22518

Published: 31/10/2023 Updated: 19/12/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated malicious user to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.  Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atlassian confluence data center

atlassian confluence data center 8.6.0

atlassian confluence server

atlassian confluence server 8.6.0

Vendor Advisories

Check Point Reference: CPAI-2023-1127 Date Published: 8 Nov 2023 Severity: Critical ...

Exploits

This improper authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account Using this account, an attacker can then perform all administrative actions that are available to the Confluence instance administrator This Metasploit module uses the administrator account to ins ...
This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator This module uses the administrator ...

Metasploit Modules

Atlassian Confluence Unauth JSON setup-restore Improper Authorization leading to RCE (CVE-2023-22518)

This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator. This module uses the administrator account to install a malicious .jsp servlet plugin which the user can trigger to gain code execution on the target in the context of the of the user running the confluence server.

msf > use exploit/multi/http/atlassian_confluence_unauth_backup
msf exploit(atlassian_confluence_unauth_backup) > show targets
    ...targets...
msf exploit(atlassian_confluence_unauth_backup) > set TARGET < target-id >
msf exploit(atlassian_confluence_unauth_backup) > show options
    ...show and set options...
msf exploit(atlassian_confluence_unauth_backup) > exploit

Github Repositories

These are the IP addresses of the most active C2/Botnets/Zombies/Scanners in European Cyber Space

Malicious IP Addresses These are the IP addresses of the most active Botnets/Zombies/Scanners in European Cyber Space All lists available blacklist_ips_for_fortinet_firewall_aatxt blacklist_ips_for_fortinet_firewall_abtxt botnets_zombies_scanner_spam_ipstxt (full list) botnets_zombies_scanner_spam_ips_ipv6txt (soon !!!) Categories SSH Brute Forcers FortiOS CVE | RCE Exploi

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents Batchfile C C# C++ CSS Dockerfile Go HTML Haskell Java JavaScript Jupyter Notebook Kotlin Lua Objective-C Others PHP Perl PowerShell Python Ruby Rust Shell Swift TypeScript Batchfile GossiTheDog/SystemNightmare - Gives you instant SYSTEM command prompt on all supported and legacy versions of W

Lỗ hổng ủy quyền không phù hợp trong Trung tâm dữ liệu Confluence và Máy chủ + bugsBonus 🔥

CVE-2023-22518 Lỗ hổng Phân Quyền Không Chính Xác trong Confluence Data Center và Server Atlassian đã cảnh báo quản trị viên về lỗ hổng nghiêm trọng trong Confluence Việc khai thác lỗ hổng này có thể dẫn đến mất dữ liệu, do đó nhà phát

Exploit-CVE-2023-22518 CVE-2023-22518 in Confluence CVE-2023-22518 : Lỗ hổng này được mô tả là “lỗ hổng về việc ủy quyền không đúng cách trong cơ sở dữ liệu và máy chủ của Confluence” Lỗi ảnh hưởng tới các phiên bản On-premises của các sản ph

An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization

CVE-2023-22518 An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization Vulnerability Installation: git clone githubcom/sanjai-AK47/CVE-2023-22518 cd CVE-2023-22518 python3 exploitpy Usage: python3 exploitpy -h

Exploit CVE-2023-22518

CVE-2023-22518 Exploit Description This repository contains an exploit script for CVE-2023-22518 The script allows for unauthorized file uploads, potentially leading to remote code execution or other security vulnerabilities Disclaimer This repository is for educational and informational purposes only Unauthorized use of this exploit script is strictly prohibited Be respons

Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥

CVE-2023-22518 Improper Authorization Vulnerability in Confluence Data Center and Server Atlassian has alerted administrators about a critical vulnerability in Confluence Exploiting this issue can lead to data loss, so developers urge you to install patches as soon as possible It is noted that the vulnerability cannot be used for data leakage, and it does not affect Atlassia

CVE_2023_22518_Checker

CVE-2023-22518 - Vulnerabilidad en Confluence Descripción Este repositorio contiene un script para detectar la vulnerabilidad CVE-2023-22518 en instancias de Confluence La vulnerabilidad permite a los atacantes realizar acciones de destrucción de datos sin necesidad de autenticación Uso del Script El script checkerpy se utiliza para verificar si una inst

Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥

CVE-2023-22518 Improper Authorization Vulnerability in Confluence Data Center and Server Atlassian has alerted administrators about a critical vulnerability in Confluence Exploiting this issue can lead to data loss, so developers urge you to install patches as soon as possible It is noted that the vulnerability cannot be used for data leakage, and it does not affect Atlassia

Confluence CVE-2023-22518

CVE-2023-22518 Confluence CVE-2023-22518 Description xmlexport-20231127-071916-1zip:Confluence 空备份文件,空备份会导致恢复后丢失全部数据!!! 备份文件可自行替换,置于脚本同级目录即可 shellplugjar:getshell 插件,来源于:githubcom/youcannotseemeagain/CVE-2023-22515_RCE 导出备份文件的接口/setup/setup-res

Checker for CVE-2023-22518 vulnerability on Confluence

CVE-2023-22518 Checker for CVE-2023-22518 and CVE-2023-22515 critical vulnerabilities in Confluence Description This script is designed to check for and exploit vulnerabilities in Atlassian Confluence instances It checks for the vulnerability CVE-2023-22518, and exploits the vulnerability CVE-2023-22515 to create a new administrator account if the instance is vulnerable (usin

Recent Articles

Stop what you’re doing and patch this critical Confluence flaw, warns Atlassian
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Risk of ‘significant data loss’ for on-prem customers

Atlassian has told customers they “must take immediate action” to address a newly discovered flaw in its Confluence collaboration tool. An advisory issued on October 31st warns of CVE-2023-22518, described as an “improper authorization vulnerability in Confluence Data Center and Server”, the on-prem versions of Atlassian’s products. All versions of Confluence are susceptible to the bug, which Atlassian rates at 9.1/10 severity on the ten-point Common Vulnerability Scoring System. The A...

Atlassian cranks up the threat meter to max for Confluence authorization flaw
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Attackers secure admin rights after vendor said they could only steal data

Atlassian reassessed the severity rating of the recent improper authorization vulnerability in Confluence Data Center and Server, raising the CVSS score from 9.1 to a maximum of 10. The company overhauled its security advisory for CVE-2023-22518 after it realized there had been a "change in the scope of the attack" on Monday. In its original advisory, the Aussie-headquartered vendor said exploitation of the vulnerability by an unauthenticated user could lead to "significant data loss." In the re...

Atlassian security advisory reveals four fresh critical flaws – in mail with dead links
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Bitbucket, Confluence and Jira all in danger, again. Sigh

Atlassian has emailed its customers to warn of four critical vulnerabilities, but the message had flaws of its own – the links it contained weren't live for all readers at the time of despatch. The email, seen by The Register, warns of flaws rated 9.0 or higher on the Common Vulnerability Scoring System (CVSS) scale and offers a link to an advisory. But that link was to a page that did not describe the relevant flaws, instead detailing CVE-2023-22518, the 9.1-rated stinker revealed in late Oct...

Chinese snoops use F5, ConnectWise bugs to sell access into top US, UK networks
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Crew may well be working under contract for Beijing

Chinese spies exploited a couple of critical-severity bugs in F5 and ConnectWise equipment earlier this year to sell access to compromised US defense organizations, UK government agencies, and hundreds of other entities, according to Mandiant. The Google-owned threat hunters said they assess, "with moderate confidence," that a crew they track as UNC5174 was behind the exploitation of CVE-2023-46747, a 9.8-out-of-10-CVSS-rated remote code execution bug in the F5 BIG-IP Traffic Management User Int...