## https://sploitus.com/exploit?id=51E53E8A-4729-5E79-AA12-A030695631C1
## CVE-2023-32315
- Openfire's administrative console (the Admin Console), a web-based application, was found to be vulnerable to a path traversal attack via the setup environment.
This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environmentin an already configured
Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users and it can lead to RCE
## Screenshot
![Screenshot_6](https://github.com/Pari-Malam/CVE-2023-32315/assets/25004320/0c1e4fbd-eade-4d6f-a3ba-13f12ed426eb)
![Screenshot_7](https://github.com/Pari-Malam/CVE-2023-32315/assets/25004320/7b9be32b-3f1b-4d19-a121-f5753db21db2)
## Requirements
- Python3.7+
## Supported Os
- Linuxer
- Wingays
## Get start with
```
$ git clone https://github.com/Pari-Malam/CVE-2023-32315
$ cd CVE-2023-32315
$ pip/pip3 install -r requirements.txt
$ python/python3 CVE-2023-32315.py
```
## Footprints Notes
- By using this tool, you agree that you are using it for educational purposes only and that you will not use it for any illegal activity. You also agree to bear all risks associated with the use of this tool. I will not be responsible for direct or indirect damage caused by the use of this tool. Don't suyyyyyyyyyyyyyyyyyyyy me!
## Author
- Pari Malam
## Contacts
[![Telegram](https://img.shields.io/badge/-Telegram-blue)](https://telegram.me/SurpriseMTFK)
[![Discord](https://img.shields.io/badge/-Discord-purple)](https://discordapp.com/users/829404192585678858)