nomisec
WORKING POC
92 stars
by Acceis · remote
https://github.com/Acceis/exploit-CVE-2023-23752
This repository contains a functional Ruby exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions 4.0.0 to 4.2.7. The exploit fetches user details and database configuration via exposed API endpoints.
Classification
Working Poc 100%
Target:
Joomla! < 4.2.8
No auth needed
Prerequisites:
Target Joomla! instance with exposed API endpoints
nomisec
WORKING POC
35 stars
by ThatNotEasy · remote
https://github.com/ThatNotEasy/CVE-2023-23752
The repository contains a Python script (`joomla.py`) that exploits CVE-2023-23752, an authentication bypass vulnerability in Joomla! leading to information leakage. The script appears functional and includes a list of API endpoints targeted by the exploit.
Classification
Working Poc 90%
Target:
Joomla! (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
Network access to the target Joomla! server · Python 3.7+ environment
nomisec
SCANNER
17 stars
by z3n70 · infoleak
https://github.com/z3n70/CVE-2023-23752
This repository contains a Ruby script that scans for CVE-2023-23752, an information disclosure vulnerability in Joomla. The script sends HTTP GET requests to a specific endpoint and checks the response for exposed credentials and database information.
Classification
Scanner 95%
Target:
Joomla (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
List of target domains or IPs in a text file
nomisec
WORKING POC
15 stars
by K3ysTr0K3R · remote
https://github.com/K3ysTr0K3R/CVE-2023-23752-EXPLOIT
This PoC exploits CVE-2023-23752, an improper access check in Joomla, by querying unauthenticated API endpoints to leak user data and credentials. It demonstrates the vulnerability by fetching sensitive information via HTTP GET requests.
Classification
Working Poc 95%
Target:
Joomla 4.0.0 through 4.2.7
No auth needed
Prerequisites:
Network access to the target Joomla instance
nomisec
WORKING POC
12 stars
by keyuan15 · infoleak
https://github.com/keyuan15/CVE-2023-23752
The repository contains a functional Python script that exploits CVE-2023-23752, an unauthorized access vulnerability in Joomla's REST API. The script sends a crafted request to the `/api/index.php/v1/config/application?public=true` endpoint to extract sensitive information, including usernames and passwords.
Classification
Working Poc 95%
Target:
Joomla 4.0.0 - 4.2.7
No auth needed
Prerequisites:
Target Joomla instance with vulnerable version · Network access to the target
nomisec
SCANNER
7 stars
by adhikara13 · infoleak
https://github.com/adhikara13/CVE-2023-23752
The repository contains a Python script that scans for CVE-2023-23752 by sending HTTP requests to a specific endpoint and extracting sensitive information (usernames, passwords, database names) from the response. It does not exploit the vulnerability but detects it by checking for exposed credentials.
Classification
Scanner 95%
Target:
Joomla (specific version not specified in code)
No auth needed
Prerequisites:
Network access to the target Joomla instance · The vulnerable endpoint must be exposed
nomisec
SCANNER
7 stars
by gibran-abdillah · infoleak
https://github.com/gibran-abdillah/CVE-2023-23752
This repository contains a bulk scanner for CVE-2023-23752, which targets Joomla's API endpoint to extract sensitive configuration data. It does not include exploit code for active exploitation but scans for vulnerable instances and retrieves exposed database information.
Classification
Scanner 90%
Target:
Joomla (unspecified version, likely 4.0.0-4.2.7)
No auth needed
Prerequisites:
List of target URLs · Network access to Joomla API endpoint
nomisec
WORKING POC
5 stars
by Youns92 · infoleak
https://github.com/Youns92/Joomla-v4.2.8---CVE-2023-23752
This repository contains a functional Bash script that exploits an unauthenticated information disclosure vulnerability in Joomla! versions 4.0.0 to 4.2.8. The exploit fetches user details and configuration data via exposed API endpoints.
Classification
Working Poc 95%
Target:
Joomla! 4.0.0 to 4.2.8
No auth needed
Prerequisites:
Target Joomla! instance with exposed API endpoints · Network access to the target
nomisec
WORKING POC
5 stars
by 0xNahim · remote
https://github.com/0xNahim/CVE-2023-23752
This repository contains a functional exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions 4.0.0 to 4.2.7. The exploit leverages improper access checks in the Joomla! API to retrieve sensitive user and configuration data, including database credentials.
Classification
Working Poc 95%
Target:
Joomla! 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Target Joomla! instance accessible via HTTP · API endpoints exposed
nomisec
WORKING POC
4 stars
by Fernando-olv · remote
https://github.com/Fernando-olv/Joomla-CVE-2023-23752
This repository contains a functional Python exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! < 4.2.8. The exploit fetches sensitive user and configuration data via exposed API endpoints.
Classification
Working Poc 95%
Target:
Joomla! < 4.2.8
No auth needed
Prerequisites:
Network access to the Joomla! API endpoints
nomisec
WORKING POC
4 stars
by Sweelg · remote
https://github.com/Sweelg/CVE-2023-23752
This repository contains a functional exploit for CVE-2023-23752, an unauthorized access vulnerability in Joomla. The script checks for the presence of sensitive data (username and password) in the response from the `/api/index.php/v1/config/application?public=true` endpoint, indicating successful exploitation.
Classification
Working Poc 95%
Target:
Joomla
No auth needed
Prerequisites:
Target URL or list of URLs
nomisec
WORKING POC
4 stars
by karthikuj · remote
https://github.com/karthikuj/CVE-2023-23752-Docker
This repository provides a Dockerized environment to demonstrate CVE-2023-23752, an unauthorized access vulnerability in Joomla 4.2.6. The setup script automates the installation and exploitation, revealing database credentials via an API endpoint.
Classification
Working Poc 95%
Target:
Joomla 4.2.6
No auth needed
Prerequisites:
Docker installed · Internet access to pull images
nomisec
SCANNER
3 stars
by ifacker · infoleak
https://github.com/ifacker/CVE-2023-23752-Joomla
The repository contains a Python script that scans for CVE-2023-23752, an unauthorized access vulnerability in Joomla. The script checks for exposed API endpoints and does not include exploit code for achieving RCE or other offensive actions.
Classification
Scanner 90%
Target:
Joomla (unspecified version)
No auth needed
Prerequisites:
Target Joomla instance with exposed API endpoints
nomisec
WORKING POC
3 stars
by mil4ne · poc
https://github.com/mil4ne/CVE-2023-23752-Joomla-v4.2.8
This repository contains a functional C++ exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions up to 4.2.7. The exploit sends a crafted HTTP request to the Joomla API endpoint to retrieve sensitive configuration data, including database credentials.
Classification
Working Poc 95%
Target:
Joomla! <= 4.2.7
No auth needed
Prerequisites:
Target Joomla! instance with vulnerable API endpoint exposed
nomisec
SCANNER
3 stars
by Saboor-Hakimi · infoleak
https://github.com/Saboor-Hakimi/CVE-2023-23752
The repository contains a Nuclei template for detecting CVE-2023-23752, an unauthorized access vulnerability in Joomla's REST API. It includes a YAML file with a request template to probe the vulnerable endpoint and a README with technical details about affected versions and endpoints.
Classification
Scanner 90%
Target:
Joomla 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Access to the Joomla REST API endpoint
nomisec
WRITEUP
3 stars
by Vulnmachines · infoleak
https://github.com/Vulnmachines/joomla_CVE-2023-23752
This repository provides a detailed analysis of CVE-2023-23752, an unauthorized access vulnerability in Joomla's REST API. It lists affected versions (Joomla 4.0.0 to 4.2.7) and enumerates API endpoints exposed when the `public=true` parameter is used, including sensitive information disclosure via `/api/index.php/v1/config/application?public=true`.
Classification
Writeup 90%
Target:
Joomla 4.0.0 - 4.2.7
No auth needed
Prerequisites:
Access to the Joomla REST API endpoint
nomisec
SCANNER
2 stars
by ibaiw · infoleak
https://github.com/ibaiw/joomla_CVE-2023-23752
This repository contains a Nuclei template for detecting CVE-2023-23752, an unauthorized access vulnerability in Joomla. The template sends a crafted HTTP request to the Joomla API endpoint and checks for the presence of sensitive data (e.g., 'password', 'user') in the response.
Classification
Scanner 90%
Target:
Joomla 4.0 to 4.2.7
No auth needed
Prerequisites:
Target must be running a vulnerable version of Joomla (4.0 to 4.2.7)
nomisec
WORKING POC
2 stars
by yusinomy · poc
https://github.com/yusinomy/CVE-2023-23752
The repository provides a functional proof-of-concept for CVE-2023-23752, an unauthorized access vulnerability in Joomla!. The exploit leverages an API endpoint to bypass authentication and retrieve sensitive configuration data.
Classification
Working Poc 90%
Target:
Joomla! (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
Access to the target Joomla! instance
nomisec
SCANNER
2 stars
by GhostToKnow · infoleak
https://github.com/GhostToKnow/CVE-2023-23752
The repository contains a Go-based multi-threaded scanner for CVE-2023-23752, which checks for the presence of sensitive configuration data exposure in Joomla! APIs. It sends HTTP requests to a specific endpoint and checks for the presence of 'dbtype' in the response to determine vulnerability.
Classification
Scanner 90%
Target:
Joomla! (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
List of target URLs
nomisec
SCANNER
2 stars
by blacks1ph0n · infoleak
https://github.com/blacks1ph0n/CVE-2023-23752
The repository contains a Nuclei template for detecting CVE-2023-23752, an improper access check vulnerability in Joomla 4.0.0-4.2.7. It sends a crafted HTTP request to the `/api/index.php/v1/config/application?public=True` endpoint to check for unauthorized access.
Classification
Scanner 90%
Target:
Joomla CMS 4.0.0-4.2.7
No auth needed
Prerequisites:
Joomla instance with vulnerable version (4.0.0-4.2.7)
nomisec
WORKING POC
2 stars
by JohnDoeAnonITA · infoleak
https://github.com/JohnDoeAnonITA/CVE-2023-23752
This repository contains a functional Go-based exploit for CVE-2023-23752, which targets an information disclosure vulnerability in Joomla. The exploit sends crafted HTTP requests to exposed API endpoints to extract sensitive configuration data, including database credentials.
Classification
Working Poc 95%
Target:
Joomla (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
Target Joomla instance with exposed API endpoints · Network access to the target
nomisec
WORKING POC
2 stars
by 0xWhoami35 · remote
https://github.com/0xWhoami35/CVE-2023-23752
This repository contains a functional exploit script for CVE-2023-23752, an authentication bypass vulnerability in Joomla versions 4.00 to 4.28. The exploit leverages an API endpoint to leak administrator credentials and MySQL configuration details.
Classification
Working Poc 95%
Attack Type
Info Leak | Auth Bypass
Target:
Joomla 4.00 to 4.28
No auth needed
Prerequisites:
Access to the target Joomla API endpoint
nomisec
SCANNER
1 stars
by TindalyTn · infoleak
https://github.com/TindalyTn/CVE-2023-23752
The repository contains a bulk scanner for CVE-2023-23752, which targets Joomla's API endpoint to retrieve configuration information. It does not include exploit code for achieving RCE or other offensive actions, but rather scans for vulnerable instances and extracts database information.
Classification
Scanner 90%
Target:
Joomla (specific version not specified)
No auth needed
Prerequisites:
List of target URLs
nomisec
WORKING POC
1 stars
by Pushkarup · remote
https://github.com/Pushkarup/CVE-2023-23752
This repository contains a functional Python script that exploits CVE-2023-23752, an authentication bypass vulnerability in Joomla versions 4.0.0 to 4.2.7. The exploit leaks sensitive configuration data, including MySQL database credentials, by sending a crafted HTTP request to the Joomla API endpoint.
Classification
Working Poc 95%
Target:
Joomla 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Target Joomla instance with API endpoint exposed · Network access to the target
nomisec
WORKING POC
1 stars
by r3dston3 · remote
https://github.com/r3dston3/CVE-2023-23752
The repository contains a functional Python exploit for CVE-2023-23752, which targets an information disclosure vulnerability in Joomla! versions 4.0.0 to 4.2.8. The exploit sends a crafted API request to retrieve sensitive configuration data, including user credentials.
Classification
Working Poc 95%
Target:
Joomla! 4.0.0 < 4.2.8
No auth needed
Prerequisites:
Target Joomla! instance with vulnerable API endpoint exposed
nomisec
WORKING POC
1 stars
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/CVE-2023-23752
This repository contains a functional Ruby exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions prior to 4.2.8. The exploit fetches sensitive user and configuration data via exposed API endpoints.
Classification
Working Poc 95%
Target:
Joomla! < 4.2.8
No auth needed
Prerequisites:
Target must be running Joomla! < 4.2.8 · API endpoints must be accessible
github
WORKING POC
1 stars
by JorgeRh4ck · pythonpoc
https://github.com/JorgeRh4ck/CVE-Exploits/tree/main/CVE-2023-23752
The repository contains a functional PoC for CVE-2023-23752, which exploits an unauthenticated information disclosure vulnerability in Joomla CMS versions 4.0.0 to 4.2.7. The PoC script extracts the MySQL database credentials by querying the Joomla API endpoint.
Classification
Working Poc 90%
Target:
Joomla CMS 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Access to the Joomla API endpoint
nomisec
WORKING POC
1 stars
by AlissonFaoli · remote
https://github.com/AlissonFaoli/CVE-2023-23752
This repository contains a functional Python exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla. The script queries Joomla's API endpoints to dump user and configuration data without authentication.
Classification
Working Poc 95%
Target:
Joomla 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Network access to the Joomla API endpoints · Python 3.10 or higher
nomisec
WORKING POC
1 stars
by wangking1 · infoleak
https://github.com/wangking1/CVE-2023-23752-poc
The repository contains a functional Go-based PoC for CVE-2023-23752, an information disclosure vulnerability in Joomla. The exploit checks for exposed API endpoints that leak sensitive configuration data, including database credentials and user information.
Classification
Working Poc 95%
Target:
Joomla 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Network access to the Joomla API endpoints
nomisec
STUB
by shellvik · poc
https://github.com/shellvik/CVE-2023-23752
The repository contains only a README.md file with a brief description of CVE-2023-23752 and mentions an exploit written in C++, but no actual exploit code or technical details are provided.
Target:
Joomla
No auth needed
nomisec
WORKING POC
by adriyansyah-mf · infoleak
https://github.com/adriyansyah-mf/CVE-2023-23752
This exploit PoC checks for CVE-2023-23752, an information disclosure vulnerability in Joomla. It sends a GET request to a specific endpoint to retrieve sensitive configuration data, including credentials, and writes vulnerable URLs to a file.
Classification
Working Poc 95%
Target:
Joomla (unspecified version)
No auth needed
Prerequisites:
Target URL list in a file · Network access to the target
nomisec
WORKING POC
by Jenderal92 · infoleak
https://github.com/Jenderal92/Joomla-CVE-2023-23752
The repository contains a functional Python script that exploits CVE-2023-23752, an improper access check vulnerability in Joomla! 4.0.0 through 4.2.7. The script sends a crafted request to the `/api/index.php/v1/config/application?public=true` endpoint to leak database credentials (host, database name, username, and password).
Classification
Working Poc 95%
Target:
Joomla! 4.0.0 through 4.2.7
No auth needed
Prerequisites:
Target Joomla! instance with vulnerable API endpoint exposed
nomisec
SCANNER
by AkbarWiraN · remote
https://github.com/AkbarWiraN/Joomla-Scanner
The repository contains a Python script that scans Joomla instances for CVE-2023-23752, an unauthorized access vulnerability, by querying the API endpoint to extract database credentials. It does not exploit the vulnerability but detects exposed configurations.
Classification
Scanner 95%
Target:
Joomla (unspecified version)
No auth needed
Prerequisites:
List of target URLs
nomisec
WORKING POC
by MrP4nda1337 · infoleak
https://github.com/MrP4nda1337/CVE-2023-23752
This repository contains a functional proof-of-concept exploit for CVE-2023-23752, targeting Joomla's API endpoint to extract sensitive configuration data such as database credentials. The script includes a bulk scanner, thread-based execution, and result logging.
Classification
Working Poc 95%
Target:
Joomla (specific version not specified)
No auth needed
Prerequisites:
List of target URLs · Python environment with required dependencies
nomisec
WORKING POC
by yTxZx · remote
https://github.com/yTxZx/CVE-2023-23752
This repository contains a functional Python script that exploits CVE-2023-23752, an unauthorized access vulnerability in Joomla! CMS versions 4.0.0 to 4.2.7. The script sends a crafted request to the Joomla API endpoint to leak sensitive database configuration details, including credentials, and supports both single-target and batch scanning with output to an Excel file.
Classification
Working Poc 95%
Target:
Joomla! CMS 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Target Joomla! instance must be accessible · API endpoint must be exposed
nomisec
SCANNER
by Ly0kha · infoleak
https://github.com/Ly0kha/Joomla-CVE-2023-23752-Exploit-Script
The repository contains a Python script that fetches and displays user and configuration data from a Joomla API endpoint. It does not exploit the vulnerability but scans for exposed information, which is part of the CVE-2023-23752 vulnerability context.
Classification
Scanner 90%
Target:
Joomla (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
Access to the Joomla API endpoint
nomisec
WORKING POC
by svaltheim · remote
https://github.com/svaltheim/CVE-2023-23752
This repository contains a Python conversion of an existing Ruby exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! v4.2.8. The original Ruby exploit is referenced from Exploit-DB (51334), and the Python version is described as functionally equivalent.
Classification
Working Poc 90%
Target:
Joomla! v4.2.8
No auth needed
Prerequisites:
Access to the target Joomla! instance
nomisec
WORKING POC
by C1ph3rX13 · remote
https://github.com/C1ph3rX13/CVE-2023-23752
This repository contains a functional Go-based exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla. The tool queries the Joomla API endpoint to extract database configuration details (type, host, user, password, and prefix) and supports concurrent scanning with proxy functionality.
Classification
Working Poc 95%
Target:
Joomla (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
Network access to the Joomla API endpoint · Target Joomla instance vulnerable to CVE-2023-23752
nomisec
WORKING POC
by mariovata · infoleak
https://github.com/mariovata/CVE-2023-23752-Python
This repository contains a functional Python script that exploits CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions prior to 4.2.8. The script fetches and displays user details and database configuration by making HTTP requests to exposed API endpoints.
Classification
Working Poc 95%
Target:
Joomla! < 4.2.8
No auth needed
Prerequisites:
Target Joomla! instance must be running a vulnerable version (< 4.2.8) · API endpoints must be accessible
nomisec
WORKING POC
by 0xx01 · remote
https://github.com/0xx01/CVE-2023-23752
The exploit script demonstrates an information disclosure vulnerability in Joomla! by querying public API endpoints to retrieve usernames and passwords from the application configuration. It uses simple curl commands to fetch and parse JSON responses.
Classification
Working Poc 90%
Target:
Joomla! (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
Target Joomla! instance with exposed API endpoints · Network access to the target
nomisec
WORKING POC
by Aureum01 · remote
https://github.com/Aureum01/CVE-2023-23752
The repository contains a functional bash script that exploits CVE-2023-23752, an authentication bypass vulnerability in Joomla! API versions 4.0 to 4.2.7. The script automates the extraction of sensitive information such as user details, application configuration, and contact details by leveraging vulnerable API endpoints.
Classification
Working Poc 90%
Target:
Joomla! API 4.0 - 4.2.7
No auth needed
Prerequisites:
Access to the Joomla! API endpoints · Target running Joomla! API 4.0 - 4.2.7
nomisec
SCANNER
by sw0rd1ight · poc
https://github.com/sw0rd1ight/CVE-2023-23752
The repository contains a bash script that scans for CVE-2023-23752, an information disclosure vulnerability in Joomla CMS. It sends HTTP requests to the vulnerable endpoint and parses responses for sensitive data like credentials.
Classification
Scanner 90%
Target:
Joomla CMS (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
httpx tool installed · target URL(s) or list of URLs
nomisec
WORKING POC
by gunzf0x · remote
https://github.com/gunzf0x/CVE-2023-23752
This repository contains a functional Go-based exploit for CVE-2023-23752, which targets an information disclosure vulnerability in Joomla. The exploit sends a crafted GET request to the vulnerable endpoint `/api/index.php/v1/config/application?public=true` to extract sensitive configuration data, including database credentials.
Classification
Working Poc 95%
Target:
Joomla (versions affected by CVE-2023-23752)
No auth needed
Prerequisites:
Network access to the target Joomla instance · Vulnerable endpoint exposed
nomisec
WORKING POC
by hadrian3689 · remote
https://github.com/hadrian3689/CVE-2023-23752_Joomla
The repository contains a functional Python exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions 4.0.0 to 4.2.7. The exploit queries the Joomla API to extract user details and database configuration without authentication.
Classification
Working Poc 95%
Target:
Joomla! 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Target Joomla! instance with vulnerable API endpoints exposed
nomisec
WORKING POC
by JeneralMotors · remote
https://github.com/JeneralMotors/CVE-2023-23752
The repository contains functional Python and Bash scripts that exploit CVE-2023-23752, an access control flaw in Joomla! CMS versions 4.0.0 through 4.2.7. The scripts retrieve sensitive information such as user data and database credentials by querying unauthenticated API endpoints.
Classification
Working Poc 95%
Target:
Joomla! CMS 4.0.0-4.2.7
No auth needed
Prerequisites:
Network access to the target Joomla! instance · API endpoints must be exposed
nomisec
WORKING POC
by Rival420 · remote
https://github.com/Rival420/CVE-2023-23752
This repository contains a functional Python exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions 4.0.0 to 4.2.7. The exploit fetches sensitive user and configuration data via exposed API endpoints.
Classification
Working Poc 95%
Target:
Joomla! < 4.2.8
No auth needed
Prerequisites:
Python 3.x · requests library · colorama library · target Joomla! site URL
github
WORKING POC
by Kl3lCrypt · pythonpoc
https://github.com/Kl3lCrypt/cve-exploits/tree/main/CVE-2023-23752
The repository contains a functional exploit for CVE-2023-23752, an authentication bypass vulnerability in Joomla CMS versions 4.0.0 to 4.2.7. The exploit script checks the Joomla version and retrieves sensitive information via exposed API endpoints.
Classification
Working Poc 95%
Target:
Joomla CMS 4.0.0 to 4.2.7
No auth needed
Prerequisites:
target domain · accessible Joomla API endpoints
nomisec
SCANNER
by Ge-Per · poc
https://github.com/Ge-Per/Scanner-CVE-2023-23752
This repository contains a Python-based scanner for CVE-2023-23752, which checks for an information disclosure vulnerability in Joomla! by querying a specific API endpoint and extracting database credentials from the response.
Classification
Scanner 100%
Target:
Joomla! (versions 4.0.0 through 4.2.7)
No auth needed
Prerequisites:
Network access to the target Joomla! instance · The target must have the vulnerable API endpoint exposed
exploitdb
WORKING POC
VERIFIED
by Alexandre ZANNI · pythonwebappsphp
https://www.exploit-db.com/exploits/51334
This exploit leverages an unauthenticated information disclosure vulnerability in Joomla! versions 4.0.0 to 4.2.7. It queries the API endpoints to retrieve user details and database configuration, including sensitive credentials.
Classification
Working Poc 100%
Target:
Joomla! 4.0.0 to 4.2.7
No auth needed
Prerequisites:
Network access to the Joomla! API endpoints
metasploit
WORKING POC
by h00die, Tianji Lab · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/joomla_api_improper_access_checks.rb
This Metasploit module exploits an improper access check vulnerability in Joomla's API endpoints to enumerate user and configuration data without authentication. It targets Joomla versions 4.0.0 to 4.2.7 by querying the `/api/index.php/v1/users` and `/api/index.php/v1/config/application` endpoints with `public=true` to retrieve sensitive information.
Classification
Working Poc 100%
Target:
Joomla 4.0.0 - 4.2.7
No auth needed
Prerequisites:
Network access to the Joomla API endpoints
vulncheck_xdb
WORKING POC
remote
https://github.com/revkami/CVE-2023-23752-Joomla-v4.2.8
This repository contains a functional C++ exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions up to 4.2.7. The exploit sends a crafted request to the Joomla API endpoint to retrieve sensitive configuration data, including database credentials.
Classification
Working Poc 95%
Target:
Joomla! <= 4.2.7
No auth needed
Prerequisites:
Joomla! API endpoint accessible · CURL and nlohmann/json libraries installed
vulncheck_xdb
WORKING POC
remote
https://github.com/0xVoodoo/PoCs
The repository contains a functional Python script that exploits CVE-2023-23752, an information disclosure vulnerability in Joomla < 4.2.8. The script queries unauthenticated API endpoints to retrieve user and configuration data, demonstrating the vulnerability.
Classification
Working Poc 95%
Target:
Joomla < 4.2.8
No auth needed
Prerequisites:
Target Joomla instance with exposed API endpoints
vulncheck_xdb
WORKING POC
remote
https://github.com/n3rdh4x0r/CVE-2023-23752
This repository contains a functional Ruby exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! versions prior to 4.2.8. The exploit fetches sensitive user and configuration data via exposed API endpoints.
Classification
Working Poc 100%
Target:
Joomla! < 4.2.8
No auth needed
Prerequisites:
Target Joomla! instance with vulnerable API endpoints exposed
vulncheck_xdb
WORKING POC
remote
https://github.com/0x0jr/HTB-Devvortex-CVE-2023-2375-PoC
This repository contains a functional Python exploit for CVE-2023-23752, an unauthenticated information disclosure vulnerability in Joomla! 4.2.8. The exploit queries the `/api/index.php/v1/config/application?public=true` endpoint to extract sensitive credentials from the JSON response.
Classification
Working Poc 95%
Target:
Joomla! 4.2.8
No auth needed
Prerequisites:
Target Joomla! instance with vulnerable API endpoint exposed
vulncheck_xdb
WORKING POC
infoleak
https://github.com/Anekant-Singhai/Exploits
The repository contains functional exploit code for CVE-2007-2447, targeting Samba's usermap script vulnerability. The exploit leverages command injection via the username field to execute a reverse shell payload.
Classification
Working Poc 95%
Target:
Samba (versions affected by CVE-2007-2447)
No auth needed
Prerequisites:
Network access to Samba service (port 139)