Share
## https://sploitus.com/exploit?id=FD9BD068-E62B-5E6D-B61B-EF955E9ED346
# CVE-2023-23752
![](https://github.com/MrP4nda1337/CVE-2023-23752/blob/main/img/jomlaa.png)

- This is a proof-of-concept code for the CVE-2023-23752 vulnerability. It allows an attacker to extract sensitive information such as usernames, passwords, and database names from a target application.
- Bulk scanner + get config + ip target from CVE-2023-23752

## Screenshot
![ss](https://github.com/MrP4nda1337/CVE-2023-23752/blob/main/img/ss.jpg)

## Installations 
- clone this repository
- install the requirements

  ```
  git clone https://github.com/MrP4nda1337/CVE-2023-23752
  ```
  ```
  cd CVE-2023-23752
  ```
  ```
  pip3 install -r requirements.txt
  ```
  ```
  python3 run.py
  ```
  
Open Target Vuln
-----------------
cd CVE-2023-23752/data/result

Disclaimer
-----------------
This code is for educational purposes only and should not be used for illegal activities. The author is not responsible for any damage or harm caused by the use or misuse of this code.