Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2023-23752 PoC — [20230201] - Core - Improper access check in webservice endpoints

Source
Associated Vulnerability
Title:[20230201] - Core - Improper access check in webservice endpoints (CVE-2023-23752)
Description:An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
Description
Poc for CVE-2023-23752 (joomla CMS)
Readme
# CVE-2023-23752
simple bash script for CVE-2023-23752 (joomla CMS)
You can use the `-u` option to specify a single URL or the `-l` option to provide a file containing a list of URLs to test the vulnerable endpoint.
This script saves all HTTP response data and displays sensitive information. 
dependancy: httpx (before using this script install [httpx](https://github.com/projectdiscovery/httpx) tool)<br>
examples:
```
./cve-2023-23752-PoC.sh -u https://vuln-site-example.com
./cve-2023-23752-PoC.sh -l list.txt
```

cve reference:https://cve.report/CVE-2023-23752<br>
author: whiteOwl<br>
enjoy!
File Snapshot

[4.0K] /data/pocs/cd6d1286c8bd79e160b748b7c2ec19cc4ddd0115 ├── [1.9K] cve-2023-23752-PoC.sh └── [ 599] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →