Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — [20230201] - Core - Improper access check in webservice endpoints

Source
Associated Vulnerability
Title:[20230201] - Core - Improper access check in webservice endpoints (CVE-2023-23752)
Description:An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
Description
A bash automation that exploits the vulnerable endpoints for the Joomla! API 4.0 - 4.2.7
Readme
# CVE-2023-23752
A bash script that exploits the vulnerable endpoints for the Joomla! API 4.0 - 4.2.7 through the use of curl and automation.

# Testing Environment
Tryhackme: https://tryhackme.com/r/room/joomify
File Snapshot

[4.0K] /data/pocs/23869447cceb6e20022c5e617b5a81bd5e34e6c9 ├── [8.9K] j00mify.sh └── [ 213] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →