Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — Joomla 安全漏洞

Source
Associated Vulnerability
Title:Joomla 安全漏洞 (CVE-2023-23752)
Description:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
Readme
# CVE-2023-23752
 ### About
- This exploit is Authentication Bypass leaking username password administrator and also  leaking mysql config username , password , host and database
- Vulnerable Version only (4.00 => 4.28)<br>

 ## Usage

```
usage: exploit.sh [-h] [-u URL] [-t TARGETS]

CVE-2023-23752 - Authentication Bypass Information Leak on Joomla!

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     Single URL to scan
  -t TARGETS, --targets TARGETS
                        File containing multiple URLs to scan
````

## Proof Of Concept (POC)
![Screenshot_2](pf.jpg)


- Single target
`bash exploit.sh -u https://example.com`

- Multiple Target
`bash exploit.sh -t targets.txt`

#### Refference:
- [EDB](https://www.exploit-db.com/exploits/51334)
- [VulnCheck](https://vulncheck.com/blog/joomla-for-rce)


## Donation

https://www.buymeacoffee.com/ardian0917s


## Blog
https://0xwhoami35.github.io/

## Disclaimer
We don't promote or encourage any illegal activity, all content provided by this repository is meant for research, educational, and threat detection purpose only.


File Snapshot

[4.0K] /data/pocs/ef7b83159c37ba6665dc2f08eab77c3d0351f59f ├── [4.9K] exploit.sh ├── [146K] pf.jpg └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.