Skip to content

Latest commit

 

History

History
84 lines (43 loc) · 2.02 KB

README.md

File metadata and controls

84 lines (43 loc) · 2.02 KB

Joomla Unauthenticated Information Disclosure Exploit (CVE-2023-23752)

Exploit

Description

This repository contains an exploit for a vulnerability named "Joomla Unauthenticated Information Disclosure" (CVE-2023-23752). Please note that this is merely a proof-of-concept script created for educational purposes and should be used responsibly.

This exploit is designed to demonstrate how an unauthenticated information disclosure vulnerability could potentially be exploited.

Disclaimer

This repository is intended for educational purposes only. Do not use this code or any information contained within for malicious purposes. Always follow ethical guidelines and respect the law.

Usage:

    python3 juid.py [option] URL

Example:

    python3 juid.py -a http://vulnerable-website.com

Options:

    -u  dump users

    -U  dump users in full JSON format

    -c  dump configs

    -C  dump configs in full JSON format

    -a  dump users and configs

    -A  dump users and configs in full JSON format

Prerequisites:

• A local development environment

• Python installed (python version should be 3.10 or higher)

• To run this exploit, you can follow these steps:

Clone this repository to your local machine.

git clone https://github.com/AlissonFaoli/CVE-2023-23752.git

Navigate to the project directory.

cd CVE-2023-23752

Run the juid.py script.

python3 juid.py -a http://vulnerable-website.com
Please remember that this exploit should never be used against real software or systems you're not authorized to test. Unauthorized access or any malicious activity is illegal.

License

This exploit is released under the MIT License. You can find more information about this in the LICENSE file.

Author: Alisson Faoli

If you have any questions or concerns about this exploit, please feel free to contact the author