Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — Joomla 安全漏洞

Source
Associated Vulnerability
Title:Joomla 安全漏洞 (CVE-2023-23752)
Description:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
Description
Poc for CVE-2023-23752 (joomla CMS)
Readme
# CVE-2023-23752
simple bash script for CVE-2023-23752 (joomla CMS)
You can use the `-u` option to specify a single URL or the `-l` option to provide a file containing a list of URLs to test the vulnerable endpoint.
This script saves all HTTP response data and displays sensitive information. 
dependancy: httpx (before using this script install [httpx](https://github.com/projectdiscovery/httpx) tool)<br>
examples:
```
./cve-2023-23752-PoC.sh -u https://vuln-site-example.com
./cve-2023-23752-PoC.sh -l list.txt
```

cve reference:https://cve.report/CVE-2023-23752<br>
author: whiteOwl<br>
enjoy!
File Snapshot

[4.0K] /data/pocs/cd6d1286c8bd79e160b748b7c2ec19cc4ddd0115 ├── [1.9K] cve-2023-23752-PoC.sh └── [ 599] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.