CVE-2023-22518
Description
All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
Severity: CRITICAL
CVE ID: CVE-2023-22518
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: CRITICAL
CVE ID: CVE-2023-22518
CVSS Score: 10.0
CVSS Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Proof Of Concept
Nuclei Templates for CVE-2023-22518
Refrence: Project Discovery GitHub
ForceFledgling
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
Refrence: GitHub
davidfortytwo
Checker for CVE-2023-22518 vulnerability on Confluence
Refrence: GitHub
RevoltSecurities
An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization
Refrence: GitHub
0x0d3ad
Exploit CVE-2023-22518
Refrence: GitHub
C1ph3rX13
Confluence CVE-2023-22518
Refrence: GitHub
bibo318
Lỗ hổng ủy quyền không phù hợp trong Trung tâm dữ liệu Confluence và Máy chủ + bugsBonus 🔥
Refrence: GitHub
Lilly-dox
Refrence: GitHub
Content on GitHub
0x00sector | watchers:3
CVE_2023_22518_Checker
CVE_2023_22518_Checker
Refrence: GitHub