Skip to content

Latest commit

 

History

History
8 lines (5 loc) · 679 Bytes

README.md

File metadata and controls

8 lines (5 loc) · 679 Bytes

jankyjred-cyphercon

Files from my CypherCon talk: https://cyphercon.com/presentation/im-the-captain-now-true-story-of-a-web-worker-watering-hole-attack/

Update the website JavaScript files to emulate the Confluence CVE-2023-22527 based on https://github.com/Vozec/CVE-2023-22527

The Cloudflarewebworker example can be copied and pasted into a Cloudflare web worker and run. You will need to update the payload there as well, but targets the same Confluence CVE.

I've also included an encoded Java Dropper that detects the OS and drops the appropriate file. This was used to target Jenkins installations where we didn't know the base OS, therefore we included both payloads.