Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — Joomla 安全漏洞

Source
Associated Vulnerability
Title:Joomla 安全漏洞 (CVE-2023-23752)
Description:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
Description
Poc for CVE-2023-23752
Readme
<div class="markdown prose w-full break-words dark:prose-invert light"><h1>CVE-2023-23752</h1><p>This is a proof-of-concept code for the CVE-2023-23752 vulnerability. It allows an attacker to extract sensitive information such as usernames, passwords, and database names from a target application.</p><h2>Usage</h2><p>To use this code, you can follow these steps:</p><ol><li>Clone this repository or download the <code>CVE-2023-23752.py</code> file.</li><li>Make sure you have Python 3 and the required packages (<code>argparse</code> and <code>requests</code>) installed on your system.</li><li>Open a terminal or command prompt and navigate to the directory where the <code>CVE-2023-23752.py</code> file is located.</li><li>Run the script with the following command:</li></ol><pre><div class="bg-black rounded-md mb-4"><div class="flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans justify-between rounded-t-md"><button class="flex ml-auto gap-2"><svg stroke="currentColor" fill="none" stroke-width="2" viewBox="0 0 24 24" stroke-linecap="round" stroke-linejoin="round" class="h-4 w-4" height="1em" width="1em" xmlns="http://www.w3.org/2000/svg"><path d="M16 4h2a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2H6a2 2 0 0 1-2-2V6a2 2 0 0 1 2-2h2"></path><rect x="8" y="2" width="8" height="4" rx="1" ry="1"></rect></svg></button></div><div class="p-4 overflow-y-auto">python CVE-2023-23752.py -u &lt;target_url&gt; -o &lt;output_file&gt;
</code></div></div></pre><p>Replace <code>&lt;target_url&gt;</code> with the URL of the target application and <code>&lt;output_file&gt;</code> with the path to the output file where the results will be saved.</p><p>Alternatively, you can provide a file containing a list of URLs to scan with the following command:</p><pre><div class="bg-black rounded-md mb-4"><div class="flex items-center relative text-gray-200 bg-gray-800 px-4 py-2 text-xs font-sans justify-between rounded-t-md"><button class="flex ml-auto gap-2"><svg stroke="currentColor" fill="none" stroke-width="2" viewBox="0 0 24 24" stroke-linecap="round" stroke-linejoin="round" class="h-4 w-4" height="1em" width="1em" xmlns="http://www.w3.org/2000/svg"><path d="M16 4h2a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2H6a2 2 0 0 1-2-2V6a2 2 0 0 1 2-2h2"></path><rect x="8" y="2" width="8" height="4" rx="1" ry="1"></rect></svg></button></div><div class="p-4 overflow-y-auto"><code class="!whitespace-pre hljs language-python">python CVE-2023-23752.py -f &lt;input_file&gt; -o &lt;output_file&gt;
</code></div></div></pre><p>Replace <code>&lt;input_file&gt;</code> with the path to the file containing a list of URLs to scan.</p><h2>Arguments</h2><p>The following arguments are available:</p><ul><li><code>-u</code>, <code>--url</code>: The URL of the target application to scan.</li><li><code>-f</code>, <code>--file</code>: The path to the file containing a list of URLs to scan.</li><li><code>-o</code>, <code>--output_file</code>: The path to the output file where the results will be saved. This argument is optional.</li><li><code>-e</code>, <code>--endpoint</code>: The endpoint to scan. The default value is <code>/api/index.php/v1/config/application?public=true</code>.</li><li><code>-t</code>, <code>--timeout</code>: The timeout in seconds for each request. The default value is <code>2</code>.</li><li><code>-m</code>, <code>--max_threads</code>: The maximum number of threads to use for scanning. The default value is <code>10</code>.</li></ul><h2>Disclaimer</h2><p>This code is for educational purposes only and should not be used for illegal activities. The author is not responsible for any damage or harm caused by the use or misuse of this code.</p></div>
File Snapshot

[4.0K] /data/pocs/7da54c25043b74dd3352167dc2c4133004eeba7f ├── [3.2K] CVE-2023-23752.py ├── [1.0K] LICENSE ├── [3.6K] README.md └── [ 17] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.