Share
## https://sploitus.com/exploit?id=F05C36AB-A236-5EA1-80DE-C02B8697F963
# CVE-2023-23752
simple program for joomla CVE-2023-23752 scanner, This is a simple Ruby script that checks if a list of targets is vulnerable to CVE-2023-23752, a critical security vulnerability in a web application. The script sends a HTTP GET request to a specified endpoint, and extracts information from the response to determine if the target is vulnerable.

![](https://github.com/z3n70/CVE-2023-23752/blob/main/Screen%20Shot%202023-02-24%20at%2008.26.46.png)

# Usage
```
ruby scanner.rb list.txt output.txt
```
list.txt is a file that contains a list of target domains or IPs, separated by newlines. output.txt is the output file where the results will be saved.

# Requirements
This script requires the following Ruby gems:

```
httparty
colorize
timeout
```

# Disclaimer
This tool is provided for educational purposes only. The author is not responsible for any damages or illegal actions caused by the use of this tool. Use at your own risk.