Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — Joomla 安全漏洞

Source
Associated Vulnerability
Title:Joomla 安全漏洞 (CVE-2023-23752)
Description:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
Description
Binaries for "CVE-2023-23752"
Readme
# Binaries for CVE-2023-23752

For ethical and educational purposes only 😉 

## Usage

```shell-session
CVE-2023-23752 -u http://someserverexample.com
```

## Build from source (Go)

If you have Go installed, do:
```shell-session
git clone https://github.com/gunzf0x/CVE-2023-23752.git
cd CVE-2023-23752
go run main.go -u http://someserverexample.com
```

## Licence
MIT
File Snapshot

[4.0K] /data/pocs/9598e5cd8237a303761d066127b08f05b9bcb33d ├── [4.0K] binaries │   ├── [7.0M] CVE_2023_23752_linux_32bit │   ├── [7.1M] CVE_2023_23752_linux_amd64 │   ├── [7.0M] CVE_2023_23752_macOS_amd64 │   ├── [7.1M] CVE_2023_23752_windows_32bit │   └── [7.1M] CVE_2023_23752_windows_amd64 ├── [ 158] go.mod ├── [ 382] go.sum ├── [1.0K] LICENCE ├── [5.9K] main.go └── [ 374] README.md 1 directory, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.