## https://sploitus.com/exploit?id=ED4A8B3A-C1E3-5F31-9D83-7140F06F03C7
# CVE-2023-22518
An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization Vulnerability
## Installation:
```bash
git clone https://github.com/sanjai-AK47/CVE-2023-22518
cd CVE-2023-22518
python3 exploit.py
```
## Usage:
```bash
python3 exploit.py -h
usage: exploit.py [-h] [-d DOMAIN] [-dL DOMAINS_LIST] [-o OUTPUT] [-to TIME_OUT] [-px PROXY] [-v]
[DESCTIPTION]: Exploitation and Detection tool for Cisco CVE-2023-46747
options:
-h, --help show this help message and exit
-d DOMAIN, --domain DOMAIN
[INFO]: Target domain for exploiting without protocol eg:(www.domain.com)
-dL DOMAINS_LIST, --domains-list DOMAINS_LIST
[INFO]: Targets domain for exploiting without protocol eg:(www.domain.com)
-o OUTPUT, --output OUTPUT
[INFO]: File name to save output
-to TIME_OUT, --time-out TIME_OUT
[INFO]: Switiching timeout will requests till for your timeout and also for BURPSUITE
-px PROXY, --proxy PROXY
[INFO]: Switiching proxy will send request to your configured proxy (eg: BURPSUITE)
-v, --verbose [INFO]: Switiching Verbose will shows offline targets
```
## Easy POC:
Users can easily make a poc with the Exploiter by giving vulnerable target and make proxy requests using your burpsuite and intercept the request
and the below is a following easy poc making flags.
```bash
python3 exploit.py -d vulnerable.com -o output.txt --proxy 127.0.0.1:8080 --time-out 40
```
## Exploited:
![Screenshot from 2023-11-05 12-36-55](https://github.com/sanjai-AK47/CVE-2023-22518/assets/119435129/dc6495c9-44b5-4c58-91f6-8a15102d9560)
## Exploitation:
When the script exploits the vulnerability it will show the vulnerable output and server path of the targets
## Information:
Important thing if any unethical exploitation the I'm not responsible for any illegal actions so plese use this for ethical and legal purposes
Proof of conept Developed by [D.Sanjai Kumar](https://www.linkedin.com/in/d-sanjai-kumar-109a7227b/) with โฅ๏ธ for any upgrade and miscoded contact me throguh my [LinkedIn](https://www.linkedin.com/in/d-sanjai-kumar-109a7227b/). Thank you!