Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — [20230201] - Core - Improper access check in webservice endpoints

Source
Associated Vulnerability
Title:[20230201] - Core - Improper access check in webservice endpoints (CVE-2023-23752)
Description:An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
Description
Binaries for "CVE-2023-23752"
Readme
# Binaries for CVE-2023-23752

For ethical and educational purposes only 😉 

## Usage

```shell-session
CVE-2023-23752 -u http://someserverexample.com
```

## Build from source (Go)

If you have Go installed, do:
```shell-session
git clone https://github.com/gunzf0x/CVE-2023-23752.git
cd CVE-2023-23752
go run main.go -u http://someserverexample.com
```

## Licence
MIT
File Snapshot

[4.0K] /data/pocs/9598e5cd8237a303761d066127b08f05b9bcb33d ├── [4.0K] binaries │   ├── [7.0M] CVE_2023_23752_linux_32bit │   ├── [7.1M] CVE_2023_23752_linux_amd64 │   ├── [7.0M] CVE_2023_23752_macOS_amd64 │   ├── [7.1M] CVE_2023_23752_windows_32bit │   └── [7.1M] CVE_2023_23752_windows_amd64 ├── [ 158] go.mod ├── [ 382] go.sum ├── [1.0K] LICENCE ├── [5.9K] main.go └── [ 374] README.md 1 directory, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →