Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — [20230201] - Core - Improper access check in webservice endpoints

Source
Associated Vulnerability
Title:[20230201] - Core - Improper access check in webservice endpoints (CVE-2023-23752)
Description:An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
Readme
This is a conversion of Ruby language to Python of the vulnerability Joomla! v4.2.8 - Unauthenticated information disclosure. 
This code is in Exploit-DB written in Ruby by ALEXANDRE ZANNI. 

I had some issues with the libraries of Ruby and I decided to 
convert the code to Python and worked well. Works the same as the Ruby version.

You can find the original in this link: https://www.exploit-db.com/exploits/51334
File Snapshot

[4.0K] /data/pocs/05b3e7d5928220566c215c8e22936e242f5b17b2 ├── [3.5K] CVE-2023-23752 └── [ 418] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →