File tree Expand file tree Collapse file tree 2 files changed +95
-0
lines changed Expand file tree Collapse file tree 2 files changed +95
-0
lines changed Original file line number Diff line number Diff line change 1+ info :
2+ name : confluence_version_scan
3+ author : Jimmy Ly
4+ severity : 3
5+ description : Fetch Confluence version from target
6+ reference :
7+ profiles :
8+ - scan
9+ - http
10+ - backup
11+ - low_severity
12+ - confluence
13+ - atlassian
14+
15+ payloads :
16+ - library : http
17+ steps :
18+ - method : get
19+ timeout : 3
20+ headers :
21+ User-Agent : " {user_agent}"
22+ allow_redirects : false
23+ ssl : false
24+ url :
25+ nettacker_fuzzer :
26+ input_format : " {{schema}}://{target}:{{ports}}/dashboard.action"
27+ prefix : " "
28+ suffix : " "
29+ interceptors :
30+ data :
31+ schema :
32+ - " http"
33+ - " https"
34+ ports :
35+ - 80
36+ - 443
37+ response :
38+ condition_type : or
39+ conditions :
40+ content :
41+ regex : <span id=\'footer-build-information\'>(.+?)</span>
42+ reverse : false
43+ log : " response_dependent['content']"
Original file line number Diff line number Diff line change 1+ info :
2+ name : confluence_cve_2023_22515_vuln
3+ author : Jimmy Ly
4+ severity : 10
5+ description : Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
6+ reference :
7+ - https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html
8+ - https://attackerkb.com/topics/Q5f0ItSzw5/cve-2023-22515/rapid7-analysis
9+ - https://confluence.atlassian.com/kb/faq-for-cve-2023-22515-1295682188.html
10+ - https://jira.atlassian.com/browse/CONFSERVER-92475
11+ - https://www.cisa.gov/news-events/alerts/2023/10/05/cisa-adds-three-known-exploited-vulnerabilities-catalog
12+ - https://nvd.nist.gov/vuln/detail/CVE-2023-22515
13+ profiles :
14+ - vuln
15+ - vulnerability
16+ - http
17+ - critical_severity
18+ - cve
19+ - confluence
20+ - atlassian
21+
22+ payloads :
23+ - library : http
24+ steps :
25+ - method : get
26+ timeout : 3
27+ headers :
28+ User-Agent : " {{user_agent}}"
29+ allow_redirects : false
30+ ssl : false
31+ url :
32+ nettacker_fuzzer :
33+ input_format : " {{schema}}://{target}:{{ports}}/dashboard.action"
34+ prefix : " "
35+ suffix : " "
36+ interceptors :
37+ data :
38+ schema :
39+ - " http"
40+ - " https"
41+ ports :
42+ - 80
43+ - 443
44+ response :
45+ condition_type : and
46+ conditions :
47+ status_code :
48+ regex : ' 200'
49+ reverse : false
50+ content :
51+ regex : <span id=\'footer-build-information\'>8\.(0\.[0-4]|1\.[0-4]|2\.[0-3]|3\.[0-2]|4\.[0-2]|5\.[0-1])</span>
52+ reverse : false
You can’t perform that action at this time.
0 commit comments