Skip to content

simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose

Notifications You must be signed in to change notification settings

z3n70/CVE-2023-23752

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2023-23752

simple program for joomla CVE-2023-23752 scanner, This is a simple Ruby script that checks if a list of targets is vulnerable to CVE-2023-23752, a critical security vulnerability in a web application. The script sends a HTTP GET request to a specified endpoint, and extracts information from the response to determine if the target is vulnerable.

Usage

ruby scanner.rb list.txt output.txt

list.txt is a file that contains a list of target domains or IPs, separated by newlines. output.txt is the output file where the results will be saved.

Requirements

This script requires the following Ruby gems:

httparty
colorize
timeout

Disclaimer

This tool is provided for educational purposes only. The author is not responsible for any damages or illegal actions caused by the use of this tool. Use at your own risk.

About

simple program for joomla CVE-2023-23752 scanner for pentesting and educational purpose

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages