POC详情: f33cddb92feced9367ffcc0488da7883ef986225

来源
关联漏洞
标题: Joomla 安全漏洞 (CVE-2023-23752)
描述:Joomla是美国Open Source Matters团队的一套使用PHP和MySQL开发的开源、跨平台的内容管理系统(CMS)。 Joomla 4.0.0版本至4.2.7版本存在安全漏洞,该漏洞源于不正确的访问检查,允许对web服务端点进行未经授权的访问。
描述
Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized
介绍
# CVE-2023-23752
Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized

## Installation
-------------


### Recommended (automatic)

1. Clone this repo `git clone https://github.com/karthikuj/CVE-2023-23752-Docker.git`
2. Change directory `cd CVE-2023-23752-Docker`
3. Run `./setup.sh`
4. Open your browser and go to http://localhost:8080/

### Manual

1. Clone this repo `git clone https://github.com/karthikuj/CVE-2023-23752-Docker.git`
2. Change directory `cd CVE-2023-23752-Docker`
3. Run `docker-compose up -d`
4. Open your browser and go to http://localhost:8080/
5. Enter all the details.
6. While configuring the database:
    - Enter `joomladb:mysql` as hostname.
    - Enter `root` as username.
    - Enter `example` as password.
    - Enter `joomla_db` as database name.
    
## Check for CVE-2023-23752
-------------
1. After installation open your browser and navigate to http://localhost:8080/api/index.php/v1/config/application?public=true
2. You will be able to see the databse username and password in plaintext in the response.


## Uninstall
-------------

1. Run `./remove-joomla.sh`
文件快照

[4.0K] /data/pocs/f33cddb92feced9367ffcc0488da7883ef986225 ├── [ 388] docker-compose.yml ├── [1.1K] README.md ├── [ 102] remove-joomla.sh └── [ 14K] setup.sh 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。