[ authorization ] [ registration ] [ استعادة ]
اتصل بنا
يمكنكم الاتصال بنا من خلال:
0day.today Exploits Market and 0day Exploits Database

Atlassian Confluence Improper Authorization / Code Execution Exploit

[ 0Day-ID-39197 ]
العنوان الكامل
Atlassian Confluence Improper Authorization / Code Execution Exploit [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price:
تاريخ الإضافة
الصنف
المنصة
تم التحقق
السعر
مجاني
الخطر
[
Security Risk Critical
]
Rel. releases
الوصف
This improper authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to the Confluence instance administrator. This Metasploit module uses the administrator account to install a malicious .jsp servlet plugin which the user can trigger to gain code execution on the target in the context of the of the user running the confluence server.
CVE
CVE-2023-22518
Other Information
Abuses
0
التعليقات
0
المشاهدات
3 677
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
مجاني
Open Exploit
You can open this source code for free
Open Exploit
Open Exploit
You can open this source code for free
Verified by
Verified by
This material is checked by Administration and absolutely workable.
المؤلف
BL
29
الثغرات
1633
القراء
57
[ التعليقات: 0 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

قم بالدخوال أو التسجيل لتكتب تعليق