Confluence Vulnerability Scanner is an automated Python-based tool designed to identify security vulnerabilities in Confluence instances by checking for known CVEs (Common Vulnerabilities and Exposures). This tool helps administrators and security professionals efficiently assess the security posture of their Confluence instances.
- Automated Scanning: Automatically checks multiple known CVEs against your Confluence instance.
- Detailed Reports: Provides clear reports about vulnerable and non-vulnerable endpoints.
- Easy to Use: Simple command-line interface for quick and efficient usage.
- Clone the Repository
git clone https://github.com/odaysec/confluPwn.git
cd confluPwn- Install Dependencies
Make sure you have Python 3 and
pipinstalled. Then install the required dependencies:
pip3 install -r requirements.txt- Create a Virtual Environment It is recommended to use a virtual environment to isolate project dependencies:
python3 -m venv confluenv- Activate the Virtual Environment On Linux / macOS:
source confluenv/bin/activateOn Windows:
.\confluenv\Scripts\activate- Usage Run the following command to start scanning:
python3 conflucheck.py --url https://<your-confluence-url> --payloads payloads.jsonReplace <your-confluence-url> with the target Confluence instance URL.
The tool will test various vulnerable endpoints and generate a detailed report.
The payloads used for vulnerability checks are stored in payloads.json.
Example payloads:
{
"CVE-2019-3396": "/rest/tinymce/1/macro/preview",
"CVE-2021-26084": "/pages/createpage-entervariables.action?SpaceKey=x",
"CVE-2022-26134": "/%24%7Bclass%3Acom.opensymphony.webwork.ServletActionContext%7D",
"CVE-2022-26138": "/setup/setupadministrator.action",
"CVE-2023-22515": "/server-info.action"
}You can customize or extend the payloads to cover more CVEs and potential attack vectors.