Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — Joomla 安全漏洞

Source
Associated Vulnerability
Title:Joomla 安全漏洞 (CVE-2023-23752)
Description:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
Description
An access control flaw was identified, potentially leading to unauthorized access to critical webservice endpoints within Joomla! CMS versions 4.0.0 through 4.2.7. This vulnerability could be exploited by attackers to gain unauthorized access to sensitive information or perform unauthorized actions.
Readme
# CVE-2023-23752

## Description

This repository contains Python and Bash scripts that serve as ports of the original Proof of Concept (PoC) written in Ruby for the vulnerability CVE-2023-23752 in Joomla! CMS versions 4.0.0 through 4.2.7 made by 'noraj' (Alexandre ZANNI). An access control flaw was identified, potentially leading to unauthorized access to critical webservice endpoints. This vulnerability could be exploited by attackers to gain unauthorized access to sensitive information or perform unauthorized actions.

## Usage:

### Bash script syntax:
```bash
./CVE-2023-23752.sh http://example.com
```
### Python script syntax:
```bash
python CVE-2023-23752.py -u example.com
```
| Option             | Description                                       |
|--------------------|---------------------------------------------------|
| `-u`, `--url`      | URL to scan                                       |
| `-f`, `--file`     | Path to the file containing URLs to scan          |
| `-o`, `--output_file` | Path to the output file (optional)               |
| `-e`, `--endpoint` | Endpoint to scan (default: /api/index.php/v1/config/application?public=true) |
| `-t`, `--timeout`  | Timeout in seconds (default: 2)                  |
| `-m`, `--max_threads` | Maximum number of threads (default: 10)          |

## Disclaimer
Important: These scripts are provided for educational purposes only. Use them at your own risk. The author assumes no responsibility for any misuse or damage caused by these scripts. Ensure that you have explicit permission to test the target system for vulnerabilities before using these scripts in any environment.
File Snapshot

[4.0K] /data/pocs/28d59488e79d00da2f01c6d117183e211843064c ├── [4.7K] CVE-2023-23752.py ├── [2.7K] CVE-2023-23752.sh ├── [ 34K] LICENSE └── [1.6K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.