Skip to content

Conversation

@jimmy-ly00
Copy link
Contributor

Checklist

  • I have followed the Contributor Guidelines.
  • The code has been thoroughly tested in my local development environment with flake8 and pylint.
  • The code is Python 3 compatible.
  • The code follows the PEP8 styling guidelines with 4 spaces indentation.
  • This Pull Request relates to only one issue or only one feature
  • I have referenced the corresponding issue number in my commit message
  • I have added the relevant documentation.
  • My branch is up-to-date with the Upstream master branch.

Changes proposed in this pull request

I have added a new module for a scanning module to get the Confluence version and also for a vuln module CVE-2023-22515. The vuln module checks if it's a vulnerable version using regex. Affected versions can be found here: https://confluence.atlassian.com/security/cve-2023-22515-privilege-escalation-vulnerability-in-confluence-data-center-and-server-1295682276.html

python3 nettacker.py -i [target] -m confluence_version_scan --skip-service-discovery
python3 nettacker.py -i [target] -m confluence_cve_2023_22515_vuln --skip-service-discovery

Your development environment

  • OS: WSL Kali Linux
  • OS Version: Linux 5.15.90.1-microsoft-standard-WSL2
  • Python Version: Python 3.11.6

@securestep9 securestep9 merged commit f7abce9 into OWASP:master Oct 29, 2023
@securestep9 securestep9 added the new module pull request with new module(s) label Oct 29, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

new module pull request with new module(s)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants