5.3
CVSSv3

CVE-2023-23752

Published: 16/02/2023 Updated: 09/01/2024
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

An issue exists in Joomla! 4.0.0 up to and including 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

joomla joomla\\!

Exploits

Joomla! versions prior to 428 suffer from an unauthenticated information disclosure vulnerability ...

Github Repositories

Poc for CVE-2023-23752

CVE-2023-23752This is a proof-of-concept code for the CVE-2023-23752 vulnerability It allows an attacker to extract sensitive information such as usernames, passwords, and database names from a target applicationUsageTo use this code, you can follow these steps:Clone this repository or download the CVE-2023-23752py fileMake sure you have Python 3 and the required packages (

Perform With Mass Exploiter In Joomla 4.2.8.

CVE-2023-23752 CVE-2023-23752 is an authentication bypass resulting in an information leak on Joomla! Servers Although rated as a CVSSv3 53 (Medium severity) by NVD, this vulnerability could allow an attacker to achieve code execution under the right circumstances That likely justifies the interest attackers have shown in this vulnerability Screenshot Requirements Pytho

Joomla! < 4.2.8 - Unauthenticated information disclosure

Joomla! information disclosure - CVE-2023-23752 exploit Joomla! &lt; 428 - Unauthenticated information disclosure Exploit for CVE-2023-23752 (400 &lt;= Joomla &lt;= 427) [EDB-51334] [PacketStorm] [WLB-TODO] Usage Example Requirements httpx docoptrb paint Example using gem: gem install httpx docopt paint # or bundle install

Joomla-CVE-2023-23752 check vulnerable + get db config + check db if can remote access Install requirements pip install -r requirementstxt Run Bot python joomlapy

Custom NSE Scripts

Custom NSE Scripts | masta ghimau CVE-2023-23752nse

Perform With Mass Exploiter In Joomla 4.2.8.

CVE-2023-23752 CVE-2023-23752 is an authentication bypass resulting in an information leak on Joomla! Servers Although rated as a CVSSv3 53 (Medium severity) by NVD, this vulnerability could allow an attacker to achieve code execution under the right circumstances That likely justifies the interest attackers have shown in this vulnerability Screenshot Requirements Pytho

Mass CVE-2023-23752 scanner

CVE-2023-23752 Mass CVE-2023-23752 scanner

All CVE 2023 in Github

CVE - 2023 CVE-2023-23752 CVE-2023-23752 CVE-2023-23752 CVE-2023-23752 CVE-2023-23752

All CVE 2023 in Github

CVE - 2023 CVE-2023-23752 CVE-2023-23752 CVE-2023-23752 CVE-2023-23752 CVE-2023-23752

CVE-2023-23752 - Recurrence of Joomla Unauthorized Access Vulnerability 脚本使用 安装python库 pip install -r requirementstxt 漏洞验证 python3 CVE-2022-26134_checkpy -u url -c whoami 批量扫描 python3 CVE-2023-23752py -f url_parttxt 影响版本 400 &lt;= Joomla &lt;= 427 漏洞复现 payload: /api/indexphp/v1/config/application?public=true 访

simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose

CVE-2023-23752 simple program for joomla CVE-2023-23752 scanner, This is a simple Ruby script that checks if a list of targets is vulnerable to CVE-2023-23752, a critical security vulnerability in a web application The script sends a HTTP GET request to a specified endpoint, and extracts information from the response to determine if the target is vulnerable Usage ruby scanne

Joomla Unauthenticated Information Disclosure (CVE-2023-23752) exploit

Joomla Unauthenticated Information Disclosure Exploit (CVE-2023-23752) Exploit Description This repository contains an exploit for a vulnerability named "Joomla Unauthenticated Information Disclosure" (CVE-2023-23752) Please note that this is merely a proof-of-concept script created for educational purposes and should be used responsibly This exploit is designed to

开源,go多并发批量探测poc,准确率高

CVE-2023-23752 介绍 开源,go多并发批量探测poc,准确率高 测试1k条数据,耗时40s左右,结果准确率90%以上 使用方法 生成linux执行文件 set CGO_ENABLED=0 set GOOS=linux go build cve-2023-23752-PoCgo 生成windows执行文件 set CGO_ENABLED=1 set GOOS=windows go build cve-2023-23752-PoCgo cve-2023-23752-Poc -l urltxt

CVE-2023-23752

Joomla Scanner Joomla Unauthorized Access Vulnerability (CVE-2023-23752) made with python Usage Display Resulttxt URL | Database Name | Username | Password | Host Disclaimer Alat ini hanya untuk edukasi, dilarang memperjual beli kan dan menyalahgunakan

An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

CVE-2023-23752 An issue was discovered in Joomla! 400 through 427 An improper access check allows unauthorized access to webservice endpoints cat iptxt | httpx -path '/api/indexphp/v1/config/application?public=true' -sc -mc 200,201,406 -silent | tee checkediptxt | awk '{split($1,a,"//");split(a[2],b,"/");system("curl -k -s \"

Joomla 未授权访问漏洞 CVE-2023-23752

CVE-2023-23752 Joomla 未授权访问漏洞 CVE-2023-23752 漏洞描述 Joomla是一款开源的内容管理系统(CMS),使用PHP编写,支持MySQL、MSSQL和PostgreSQL等多种数据库系统。访问限制不当导致未经授权访问服务器REST API接口。 受影响版本:Joomla 400 - 427 使用帮助 optional arguments: -h, --help show this

simple program for joomla scanner CVE-2023-23752 with target list

CVE-2023-23752 This is a proof-of-concept code for the CVE-2023-23752 vulnerability It allows an attacker to extract sensitive information such as usernames, passwords, and database names from a target application Bulk scanner + get config + ip target from CVE-2023-23752 Screenshot Installations clone this repository install the requirements git clone githubc

Joomla! information disclosure - CVE-2023-23752 exploit Exploit for CVE-2023-23752 (400 &lt;= Joomla &lt;= 427) Uso Antes de usar el proyecto necesitaremos instalar los paquetes necesarios (recomiendo crear un entorno virtual antes) pip install -r requierementstxt Prueba de concepto Para crear un entorno vulnerable necesitar

This Repositories contains list of One Liners with Descriptions and Installation requirements

One-Liner-Collections This Repositories contains list of One Liners with Descriptions and Installation requirements ──────────────────────────────────────────────────────────────────────── SQL Injection Installation Requirements Subfin

Joomla未授权访问漏洞

CVE-2023-23752 Joomla未授权访问漏洞 fofa: product="Joomla" Usage usage: CVE-2023-23752py [-h] [-u URL] [-f FILE] [-t THREAD] [-T TIMEOUT] [-o OUTPUT] optional arguments: -h, --help show this help message and exit -u URL, --url URL Target url(eg urltxt) -f FILE, --file FILE Target file(eg urltxt) -t THREAD, --thread THREAD

CVE-2023-23752

Joomla Scanner Joomla Unauthorized Access Vulnerability (CVE-2023-23752) made with python Usage Display Resulttxt URL | Database Name | Username | Password | Host Disclaimer Alat ini hanya untuk edukasi, dilarang memperjual beli kan dan menyalahgunakan

CVE-2023-23752 nuclei template

CVE-2023-23752 CVE-2023-23752 nuclei template Joomla (CVE-2023-23752) - a request parameter breaks through the Rest API Affected version ​ Joomla roughly has three routing entries, which are indexphp in the root directory (users access articles) administrator/indexphp in the root directory (administrator management) api/indexphp in the root directory (Rest API for develop

Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

joomla_CVE-2023-23752 Joomla - a request parameter breaks through the Rest API Affected version ​ Joomla roughly has three routing entries, which are indexphp in the root directory (users access articles) administrator/indexphp in the root directory (administrator management) api/indexphp in the root directory (Rest API for developers) The unauthorized interface is exac

CVE-2023-23752 Joomla 未授权访问漏洞 poc

CVE-2023-23752-Joomla 免责声明: 本网络安全工具仅用于提供技术支持,不涉及任何应用或商业行为。用户在使用本网络安全工具的过程中,不得以任何方式损害他人的合法权益。 该工具的运行仅依赖用户提供的信息,并不包括任何违反相关法律法规的内容。用户在使用本网络安全工具时,

Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized

CVE-2023-23752 Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized Installation Recommended (automatic) Clone this repo git clone githubcom/karthikuj/CVE-2023-23752-Dockergit Change directory cd CVE-2023-23752-Docker Run /setupsh Open your browser and go to localhost:8080/ Manual Clone this repo git clone githubcom/karthikuj/CVE-

未授权访问漏洞

joomla_CVE-2023-23752 未授权访问漏洞 nuclei

Perform With Mass Exploiter In Joomla 4.2.8.

CVE-2023-23752 CVE-2023-23752 is an authentication bypass resulting in an information leak on Joomla! Servers Although rated as a CVSSv3 53 (Medium severity) by NVD, this vulnerability could allow an attacker to achieve code execution under the right circumstances That likely justifies the interest attackers have shown in this vulnerability Screenshot Requirements Pytho

Bulk scanner + get config from CVE-2023-23752

CVE-2023-23752 Bulk scanner + get config from CVE-2023-23752 Screenshot Installations clone this repository install the requirements pip3 install -r requirementstxt

Joomla! 未授权访问漏洞

CVE-2023-23752 Joomla! 未授权访问漏洞 POC:/api/indexphp/v1/config/application?public=true 漏洞分析 xzaliyuncom/t/12175

python 2.7

Joomla-CVE-2023-23752 python 27 Buy Coffee : Bitcoin $: 31mtLHqhaXXyCMnT2EU73U8fwYwigiEEU1 Perfect Money $: U22270614 Saweria $: saweriaco/Shin403 Trakteer $: trakteerid/shin403

Mass Checker CVE-2023-23752

Mass Chcecker CVE-2023-23752 Pastikan Python sudah terinstall di komputer Anda Download file listtxt yang berisi daftar URL yang akan di-scan, dan letakkan dalam folder yang sama dengan file CVE-2023-23752py Jalankan file CVE-2023-23752py dengan menggunakan terminal atau command prompt Caranya adalah: Buka terminal atau command prompt Masuk ke direktori dimana file CVE

HB团队公开扫描仪

HScan 项目创建于北京时间2023年2月19日 作者近期需要参加学校比赛,该项目更新比较慢 功能: -- poc扫描(单链接或者批量扫描) -- 网页url提取 -- 权重查询 未来更新功能: -- 自动化深度扫描 -- cms指纹识别 -- 多线程工作 -- 更新更丰富的poc库

CVE-2023-23752 décrit un contournement d'authentification qui permet à un attaquant de divulguer des informations privilégiées Les exploits publics se concentrent sur la fuite des informations d'identification de la base de données MySQL de la victime - une perspective peu intéressante (nous pensions), car exposer la base de

CVE-2023-23752 Data Extractor

CVE-2023-23752 CVE-2023-23752 Data Extractor

Devvortex githubcom/Acceis/exploit-CVE-2023-23752 githubcom/canonical/apport/commit/e5f78cc89f1f5888b6a56b785dddcb0364c48ecb

CVE-2023-23752 Joomla! v428 - Unauthenticated Information Disclosure A proof-of-concept for CVE-2023-23752 Joomla! v428 - Unauthenticated Information Disclosure For versions 400 &lt; 428 (it means from 400 up to 427) Getting Started Executing program With python3 python3 exploitpy -t joomlaurl/ Help For help m

Joomla Information disclosure exploit code written in C++.

CVE-2023-23752 Joomla Information disclosure exploit code written in C++

Joomla! < 4.2.8 - Unauthenticated information disclosure exploit

Joomla! &lt; 428 - Unauthenticated Information Disclosure Exploit This Python script is an exploitation tool for an unauthenticated information disclosure vulnerability in Joomla! versions 400 up to 427 It allows for the disclosure of sensitive information from vulnerable Joomla! sites Description The exploit targets a vulnerability identified as CVE-2023-23752, whe

Python version of https://www.exploit-db.com/exploits/15222 by ALEXANDRE ZANNI

CVE2023-23752 Joomla! &lt; 428 - Unauthenticated information disclosure Python version of wwwexploit-dbcom/exploits/15222 by ALEXANDRE ZANNI Based on: noraj (Alexandre ZANNI) for ACCEIS (wwwacceisfr) Original author website: pwnby/noraj/ Original Exploit source: githubcom/Acceis/exploit-CVE-2023-23752 Software Link: downloads

This Python implementation serves an educational purpose by demonstrating the exploitation of CVE-2023-23752. The code provides insight into the vulnerability's exploitation.

Joomla-CVE-2023-23752 This Python implementation serves an educational purpose by illustrating the exploitation of CVE-2023-23752 The code offers insight into how the vulnerability can be exploited Table of Contents About Installation Usage Contributing Vulnerable Environment Deployment Credits License Disclaimer About This project showcases a Python implementation aimed at

Seasonal Machine devvortex easy machine Enumerate Firstly Copy the ip machine and fill it on /etc/hosts devvortexhtb enumerate subdo with gobuster or fuzz for nmap i scanned but only 22 and 80 port opened gobuster vhost -u devvortexhtb/ -w /usr/share/wordlists/Seclists/Discovery/DNS/subdomains-top1million-5000txt -apppend-domain and you will got this subdomain devdev

Binaries for "CVE-2023-23752"

Binaries for CVE-2023-23752 For ethical and educational purposes only 😉 Usage CVE-2023-23752 -u someserverexamplecom Build from source (Go) If you have Go installed, do: git clone githubcom/gunzf0x/CVE-2023-23752git cd CVE-2023-23752 go run maingo -u someserverexamplecom

Poc for Joomla v4.0 > 4.28 Unauthenticated information disclosure

Joomla-v4x---Unauthenticated-information-disclosure Poc for Joomla v40 &gt; 428 Unauthenticated information disclosure This is a POC for CVE-2023-23752 I created it for a Machine on HackTheBox Disclaimer &gt;&gt; I am not Responsible for any miss use or abuse by using this POC for learning and educational purposes only Thank You Reference &gt;&gt; ht

Poc for Joomla v4.0 > 4.28 Unauthenticated information disclosure

Joomla-v4x---Unauthenticated-information-disclosure Poc for Joomla v40 &gt; 428 Unauthenticated information disclosure This is a POC for CVE-2023-23752 I created it for a Machine on HackTheBox Disclaimer &gt;&gt; I am not Responsible for any miss use or abuse by using this POC for learning and educational purposes only Thank You Reference &gt;&gt; ht

This is a POC for CVE-2023-23752 written in Python that displays username and password information CVE-2023-23752 (Joomla! 400 &lt; 428) Usage = python3 exploitpy The execution of the script is demonstrated in the GIF below:

Joomla Unauthorized Access Vulnerability

CVE-2023-23752 Joomla Unauthorized Access Vulnerability CVE-2023–23752 This readme file provides information about the Joomla Unauthorized Access Vulnerability CVE-2023–23752 and how to detect This vulnerability allows an attacker to bypass the Joomla access control system and gain unauthorized access to the backend of a Joomla website The exploit takes advantage

An access control flaw was identified, potentially leading to unauthorized access to critical webservice endpoints within Joomla! CMS versions 4.0.0 through 4.2.7. This vulnerability could be exploited by attackers to gain unauthorized access to sensitive information or perform unauthorized actions.

CVE-2023-23752 Description This repository contains Python and Bash scripts that serve as ports of the original Proof of Concept (PoC) written in Ruby for the vulnerability CVE-2023-23752 in Joomla! CMS versions 400 through 427 made by 'noraj' (Alexandre ZANNI) An access control flaw was identified, potentially leading to unauthorized access to critical webservic

CVE-2023-23752 Joomla Unauthenticated Information Disclosure

CVE-2023-23752 CVE-2023-23752 Joomla Unauthenticated Information Disclosure Description 支持高并发检测 将url写入urlstxt,只支持ip:port &amp; ip:port 格式 使用-p参数添加代理 Just run Usage Help \CVE-2023-23752exe -h ██████╗██╗ ██╗███████╗ ██████╗ ████

A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7

CVE-2023-23752 - Joomla Improper Access Check An issue has been identified in Joomla versions 400 through 427 This vulnerability relates to an improper access check within the application, enabling unauthorized access to critical webservice endpoints Proof of Concept (PoC) A Proof of Concept (PoC) demonstrating this vulnerability is available Please note that this PoC is

Mass Scanner for CVE-2023-23752

CVE-2023-23752 Bulk scanner + get config from CVE-2023-23752 Installations clone this repository install the requirements pip3 install -r requirementstxt

Exploit for CVE-2023-23752 (4.0.0 <= Joomla <= 4.2.7).

CVE-2023-23752 Exploit for CVE-2023-23752 (400 &lt;= Joomla &lt;= 427) Introduction As discussed, CVE-2023-23752 is an authentication bypass resulting in an information leak Most of the public exploits use the bypass to leak the system's configuration, which contains the Joomla! MySQL database credentials in plaintext The following demonstrates the leak: $ c

Joomla! < 4.2.8 - Unauthenticated information disclosure

CVE-2023-23752-Python usage: CVE-2023-23752py [-h] url Joomla! &lt; 428 - Unauthenticated information disclosure positional arguments: url Root URL (base path) including HTTP scheme, port, and root folder options: -h, --help show this help message and exit