Poc for CVE-2023-23752 (joomla CMS)# CVE-2023-23752
simple bash script for CVE-2023-23752 (joomla CMS)
You can use the `-u` option to specify a single URL or the `-l` option to provide a file containing a list of URLs to test the vulnerable endpoint.
This script saves all HTTP response data and displays sensitive information.
dependancy: httpx (before using this script install [httpx](https://github.com/projectdiscovery/httpx) tool)<br>
examples:
```
./cve-2023-23752-PoC.sh -u https://vuln-site-example.com
./cve-2023-23752-PoC.sh -l list.txt
```
cve reference:https://cve.report/CVE-2023-23752<br>
author: whiteOwl<br>
enjoy!
[4.0K] /data/pocs/cd6d1286c8bd79e160b748b7c2ec19cc4ddd0115
├── [1.9K] cve-2023-23752-PoC.sh
└── [ 599] README.md
0 directories, 2 files