An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
Attack Vector (AV) | Network | Adjacent | Local | Physical |
---|---|---|---|---|
Attack Complexity (AC) | LOW | High | ||
Privileges Required (PR) | None | Low | High | |
User Interaction (UI) | None | Required | ||
Scope (S) | Unchange | Change | ||
Confidentiality (C) | None | Low | High | |
Integrity (I) | None | Low | High | |
Availability (A) | None | Low | High |
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: PHP(12 tweets)
List of frequently cited URLs
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
cvetrends.com | 49 |
cyberiqs.com | 39 |
lists.astaro.com | 18 |
github.com | 3 |
twitter.com | 3 |
dashboard.shadowserver.org | 3 |
Name | URL |
---|---|
WhiteOwl-Pub/CVE-2023-23752 | https://github.com/WhiteOwl-Pub/CVE-2023-23752 |
YusinoMy/CVE-2023-23752 | https://github.com/YusinoMy/CVE-2023-23752 |
Saboor-Hakimi/CVE-2023-23752 | https://github.com/Saboor-Hakimi/CVE-2023-23752 |
DanielRuf/CVE-2023-23752 | https://github.com/DanielRuf/CVE-2023-23752 |
Vulnmachines/joomla_CVE-2023-23752 | https://github.com/Vulnmachines/joomla_CVE-2023-23752 |
Name | URL |
---|---|
WhiteOwl-Pub/CVE-2023-23752 | github.com |
YusinoMy/CVE-2023-23752 | github.com |
Saboor-Hakimi/CVE-2023-23752 | github.com |
DanielRuf/CVE-2023-23752 | github.com |
Vulnmachines/joomla_CVE-2023-23752 | github.com |