Skip to main content

CVE-2023-23752

Description

An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

NVD
Severity: MEDIUM
CVE ID: CVE-2023-23752
CVSS Score: 5.3
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2023-23752
yusinomy

Joomla! 未授权访问漏洞

Refrence: GitHub

Saboor-Hakimi

CVE-2023-23752 nuclei template

Refrence: GitHub

Vulnmachines

Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

Refrence: GitHub

sw0rd1ight

Poc for CVE-2023-23752 (joomla CMS)

Refrence: GitHub

wangking1

CVE-2023-23752 poc

Refrence: GitHub

ibaiw

未授权访问漏洞

Refrence: GitHub

ifacker

CVE-2023-23752 Joomla 未授权访问漏洞 poc

Refrence: GitHub

z3n70

simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose

Refrence: GitHub

keyuan15

Joomla 未授权访问漏洞 CVE-2023-23752

Refrence: GitHub

adriyansyah-mf

Refrence: GitHub

haxor1337x

Mass Checker CVE-2023-23752

Refrence: GitHub

GhostToKnow

开源,go多并发批量探测poc,准确率高

Refrence: GitHub

gibran-abdillah

Bulk scanner + get config from CVE-2023-23752

Refrence: GitHub

H454NSec

An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

Refrence: GitHub

Jenderal92

python 2.7

Refrence: GitHub

Acceis

Joomla! < 4.2.8 - Unauthenticated information disclosure

Refrence: GitHub

karthikuj

Joomla Unauthorized Access Vulnerability (CVE-2023-23752) Dockerized

Refrence: GitHub

0xNahim

Refrence: GitHub

adhikara13

Poc for CVE-2023-23752

Refrence: GitHub

AkbarWiraN

CVE-2023-23752

Refrence: GitHub

Ge-Per

Refrence: GitHub

ThatNotEasy

Perform With Mass Exploiter In Joomla 4.2.8.

Refrence: GitHub

wibuheker

Refrence: GitHub

Sweelg

Joomla未授权访问漏洞

Refrence: GitHub

MrP4nda1337

simple program for joomla scanner CVE-2023-23752 with target list

Refrence: GitHub

lainonz

Mass CVE-2023-23752 scanner

Refrence: GitHub

yTxZx

Refrence: GitHub

AlissonFaoli

Joomla Unauthenticated Information Disclosure (CVE-2023-23752) exploit

Refrence: GitHub

Pushkarup

Exploit for CVE-2023-23752 (4.0.0 <= Joomla <= 4.2.7).

Refrence: GitHub

cybernetwiz

Joomla Unauthorized Access Vulnerability

Refrence: GitHub

Youns92

CVE-2023-23752

Refrence: GitHub

Ly0kha

Joomla CVE-2023-23752 Exploit Script

Refrence: GitHub

r3dston3

Refrence: GitHub

svaltheim

Refrence: GitHub

Fernando-olv

This Python implementation serves an educational purpose by demonstrating the exploitation of CVE-2023-23752. The code provides insight into the vulnerability's exploitation.

Refrence: GitHub

K3ysTr0K3R

A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7

Refrence: GitHub

hadrian3689

Refrence: GitHub

C1ph3rX13

CVE-2023-23752 Joomla Unauthenticated Information Disclosure

Refrence: GitHub

JeneralMotors

An access control flaw was identified, potentially leading to unauthorized access to critical webservice endpoints within Joomla! CMS versions 4.0.0 through 4.2.7. This vulnerability could be exploited by attackers to gain unauthorized access to sensitive information or perform unauthorized actions.

Refrence: GitHub

gunzf0x

Binaries for "CVE-2023-23752"

Refrence: GitHub

TindalyTn

Mass Scanner for CVE-2023-23752

Refrence: GitHub

shellvik

Joomla Information disclosure exploit code written in C++.

Refrence: GitHub

Rival420

Joomla! < 4.2.8 - Unauthenticated information disclosure exploit

Refrence: GitHub

JohnDoeAnonITA

CVE-2023-23752 Data Extractor

Refrence: GitHub

0xWhoami35

Refrence: GitHub

mariovata

Joomla! < 4.2.8 - Unauthenticated information disclosure

Refrence: GitHub

0xx01

A simple bash script to exploit Joomla! < 4.2.8 - Unauthenticated information disclosure

Refrence: GitHub

Content on GitHub

HaxorSec1945 | watchers:0

CVE2023-23752

Refrence: GitHub

raystr-atearedteam | watchers:0

CVE2023-23752
Python version of https://www.exploit-db.com/exploits/15222 by ALEXANDRE ZANNI

Refrence: GitHub