关联漏洞
标题:
Joomla 安全漏洞
(CVE-2023-23752)
描述:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
介绍
# CVE-2023-23752
### About
- This exploit is Authentication Bypass leaking username password administrator and also leaking mysql config username , password , host and database
- Vulnerable Version only (4.00 => 4.28)<br>
## Usage
```
usage: exploit.sh [-h] [-u URL] [-t TARGETS]
CVE-2023-23752 - Authentication Bypass Information Leak on Joomla!
options:
-h, --help show this help message and exit
-u URL, --url URL Single URL to scan
-t TARGETS, --targets TARGETS
File containing multiple URLs to scan
````
## Proof Of Concept (POC)

- Single target
`bash exploit.sh -u https://example.com`
- Multiple Target
`bash exploit.sh -t targets.txt`
#### Refference:
- [EDB](https://www.exploit-db.com/exploits/51334)
- [VulnCheck](https://vulncheck.com/blog/joomla-for-rce)
## Donation
https://www.buymeacoffee.com/ardian0917s
## Blog
https://0xwhoami35.github.io/
## Disclaimer
We don't promote or encourage any illegal activity, all content provided by this repository is meant for research, educational, and threat detection purpose only.
文件快照
[4.0K] /data/pocs/ef7b83159c37ba6665dc2f08eab77c3d0351f59f
├── [4.9K] exploit.sh
├── [146K] pf.jpg
└── [1.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。