cve/2023/CVE-2023-22527.md

78 lines
3.9 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-22527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22527)
![](https://img.shields.io/static/v1?label=Product&message=Confluence%20Data%20Center&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Confluence%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=RCE%20(Remote%20Code%20Execution)&color=brighgreen)
### Description
A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.Most recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassians January Security Bulletin.
### POC
#### Reference
- http://packetstormsecurity.com/files/176789/Atlassian-Confluence-SSTI-Injection.html
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/20142995/pocsuite3
2024-05-25 21:48:12 +02:00
- https://github.com/20142995/sectool
- https://github.com/Avento/CVE-2023-22527_Confluence_RCE
2024-06-10 07:22:43 +00:00
- https://github.com/BBD-YZZ/Confluence-RCE
2024-05-25 21:48:12 +02:00
- https://github.com/Boogipop/CVE-2023-22527-Godzilla-MEMSHELL
- https://github.com/C1ph3rX13/CVE-2023-22527
- https://github.com/Chocapikk/CVE-2023-22527
- https://github.com/Drun1baby/CVE-2023-22527
- https://github.com/Lotus6/ConfluenceMemshell
- https://github.com/M0untainShley/CVE-2023-22527-MEMSHELL
- https://github.com/MD-SEC/MDPOCS
- https://github.com/MaanVader/CVE-2023-22527-POC
- https://github.com/Manh130902/CVE-2023-22527-POC
- https://github.com/Marco-zcl/POC
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/Niuwoo/CVE-2023-22527
- https://github.com/Ostorlab/KEV
- https://github.com/Privia-Security/CVE-2023-22527
- https://github.com/ReAbout/web-sec
2024-05-28 08:49:17 +00:00
- https://github.com/RevoltSecurities/CVE-2023-22527
2024-05-25 21:48:12 +02:00
- https://github.com/Sudistark/patch-diff-CVE-2023-22527
2024-07-25 21:25:12 +00:00
- https://github.com/T0ngMystic/Vulnerability_List
2024-05-28 08:49:17 +00:00
- https://github.com/Threekiii/Awesome-POC
2024-06-22 09:37:59 +00:00
- https://github.com/Threekiii/Awesome-Redteam
2024-05-25 21:48:12 +02:00
- https://github.com/Threekiii/CVE
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Tropinene/Yscanner
- https://github.com/VNCERT-CC/CVE-2023-22527-confluence
- https://github.com/Vozec/CVE-2023-22527
- https://github.com/Y4tacker/JavaSec
- https://github.com/YongYe-Security/CVE-2023-22527
- https://github.com/adminlove520/CVE-2023-22527
- https://github.com/afonsovitorio/cve_sandbox
- https://github.com/bad-sector-labs/ansible-role-vulhub
2024-05-28 08:49:17 +00:00
- https://github.com/badsectorlabs/ludus_vulhub
2024-05-25 21:48:12 +02:00
- https://github.com/cleverg0d/CVE-2023-22527
2024-06-07 04:52:01 +00:00
- https://github.com/cve-sandbox-bot/cve_sandbox
2024-05-25 21:48:12 +02:00
- https://github.com/d4n-sec/d4n-sec.github.io
2024-05-28 08:49:17 +00:00
- https://github.com/dddinmx/POC-Pocsuite3
2024-05-25 21:48:12 +02:00
- https://github.com/farukokutan/Threat-Intelligence-Research-Reports
- https://github.com/ga0we1/CVE-2023-22527_Confluence_RCE
- https://github.com/gobysec/Goby
2024-05-28 08:49:17 +00:00
- https://github.com/jarrodcoulter/jankyjred-cyphercon
2024-08-10 19:04:30 +00:00
- https://github.com/k3ppf0r/2024-PocLib
2024-05-25 21:48:12 +02:00
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/netlas-io/netlas-dorks
- https://github.com/nomi-sec/PoC-in-GitHub
2024-07-25 21:25:12 +00:00
- https://github.com/onewinner/VulToolsKit
2024-05-25 21:48:12 +02:00
- https://github.com/ramirezs4/Tips-and-tools-forensics---RS4
- https://github.com/sanjai-AK47/CVE-2023-22527
- https://github.com/tanjiti/sec_profile
- https://github.com/thanhlam-attt/CVE-2023-22527
2024-05-28 08:49:17 +00:00
- https://github.com/toxyl/lscve
- https://github.com/vulncheck-oss/cve-2023-22527
- https://github.com/vulncheck-oss/go-exploit
- https://github.com/wjlin0/poc-doc
2024-05-25 21:48:12 +02:00
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/xingchennb/POC-
- https://github.com/yoryio/CVE-2023-22527