# CVE-2023-22518
An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization Vulnerability

## Installation:

git clone
cd CVE-2023-22518

## Usage:

python3 -h                                                                                 
usage: [-h] [-d DOMAIN] [-dL DOMAINS_LIST] [-o OUTPUT] [-to TIME_OUT] [-px PROXY] [-v]

[DESCTIPTION]: Exploitation and Detection tool for Cisco CVE-2023-46747

  -h, --help            show this help message and exit
  -d DOMAIN, --domain DOMAIN
                        [INFO]: Target domain for exploiting without protocol eg:(
  -dL DOMAINS_LIST, --domains-list DOMAINS_LIST
                        [INFO]: Targets domain for exploiting without protocol eg:(
  -o OUTPUT, --output OUTPUT
                        [INFO]: File name to save output
  -to TIME_OUT, --time-out TIME_OUT
                        [INFO]: Switiching timeout will requests till for your timeout and also for BURPSUITE
  -px PROXY, --proxy PROXY
                        [INFO]: Switiching proxy will send request to your configured proxy (eg: BURPSUITE)
  -v, --verbose         [INFO]: Switiching Verbose will shows offline targets


## Easy POC:

Users can easily make a poc with the Exploiter by giving vulnerable target and make proxy requests using your burpsuite and intercept the request
and the below is a following easy poc making flags.

python3 -d -o output.txt --proxy --time-out 40

## Exploited:
![Screenshot from 2023-11-05 12-36-55](

## Exploitation:

When the script exploits the vulnerability it will show the vulnerable output and server path of the targets

## Information:

Important thing if any unethical exploitation the I'm not responsible for any illegal actions so plese use this for ethical and legal purposes

Proof of conept Developed by [D.Sanjai Kumar]( with โ™ฅ๏ธ for any upgrade and miscoded contact me throguh my [LinkedIn]( Thank you!