PoC-in-GitHub/2023/CVE-2023-30253.json
2025-12-19 15:44:13 +09:00

223 lines
No EOL
8 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 806179763,
"name": "cve-2023-30253",
"full_name": "Rubikcuv5\/cve-2023-30253",
"owner": {
"login": "Rubikcuv5",
"id": 47946047,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47946047?v=4",
"html_url": "https:\/\/github.com\/Rubikcuv5",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rubikcuv5\/cve-2023-30253",
"description": "Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.",
"fork": false,
"created_at": "2024-05-26T15:43:08Z",
"updated_at": "2025-12-19T03:58:21Z",
"pushed_at": "2024-05-26T23:50:40Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 806520189,
"name": "CVE-2023-30253-Exploit",
"full_name": "04Shivam\/CVE-2023-30253-Exploit",
"owner": {
"login": "04Shivam",
"id": 114946384,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114946384?v=4",
"html_url": "https:\/\/github.com\/04Shivam",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/04Shivam\/CVE-2023-30253-Exploit",
"description": "Poc for CVE-2023-30253 ",
"fork": false,
"created_at": "2024-05-27T11:00:43Z",
"updated_at": "2024-06-11T17:31:56Z",
"pushed_at": "2024-05-27T11:16:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 806630340,
"name": "Exploit-for-Dolibarr-17.0.0-CVE-2023-30253",
"full_name": "nikn0laty\/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253",
"owner": {
"login": "nikn0laty",
"id": 96344826,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96344826?v=4",
"html_url": "https:\/\/github.com\/nikn0laty",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nikn0laty\/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253",
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
"fork": false,
"created_at": "2024-05-27T15:10:12Z",
"updated_at": "2025-11-13T15:09:07Z",
"pushed_at": "2024-05-28T15:10:20Z",
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 41,
"score": 0,
"subscribers_count": 1
},
{
"id": 818045212,
"name": "CVE-2023-30253-PoC",
"full_name": "g4nkd\/CVE-2023-30253-PoC",
"owner": {
"login": "g4nkd",
"id": 150204934,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150204934?v=4",
"html_url": "https:\/\/github.com\/g4nkd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/g4nkd\/CVE-2023-30253-PoC",
"description": "I couldnt find a PoC for CVE-2023-30253, so I developed an effective one",
"fork": false,
"created_at": "2024-06-21T01:41:34Z",
"updated_at": "2025-12-15T15:05:44Z",
"pushed_at": "2024-07-31T00:16:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 819502016,
"name": "Dolibarr-17.0.0-Exploit-CVE-2023-30253",
"full_name": "dollarboysushil\/Dolibarr-17.0.0-Exploit-CVE-2023-30253",
"owner": {
"login": "dollarboysushil",
"id": 48991715,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48991715?v=4",
"html_url": "https:\/\/github.com\/dollarboysushil",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dollarboysushil\/Dolibarr-17.0.0-Exploit-CVE-2023-30253",
"description": "In Dolibarr 17.0.0 with the CMS Website plugin (core) enabled, an authenticated attacker can obtain remote command execution via php code injection bypassing the application restrictions.",
"fork": false,
"created_at": "2024-06-24T16:22:31Z",
"updated_at": "2025-04-20T10:14:20Z",
"pushed_at": "2024-06-24T16:39:15Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-30253",
"dolibarr",
"dolibarr-exploit"
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 826647567,
"name": "DolibabyPhp",
"full_name": "andria-dev\/DolibabyPhp",
"owner": {
"login": "andria-dev",
"id": 19195374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19195374?v=4",
"html_url": "https:\/\/github.com\/andria-dev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/andria-dev\/DolibabyPhp",
"description": "An authenticated RCE exploit for Dolibarr ERP\/CRM CVE-2023-30253.",
"fork": false,
"created_at": "2024-07-10T05:39:01Z",
"updated_at": "2024-07-17T01:01:38Z",
"pushed_at": "2024-07-20T23:27:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 860627688,
"name": "CVE-2023-30253",
"full_name": "bluetoothStrawberry\/CVE-2023-30253",
"owner": {
"login": "bluetoothStrawberry",
"id": 154050956,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154050956?v=4",
"html_url": "https:\/\/github.com\/bluetoothStrawberry",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bluetoothStrawberry\/CVE-2023-30253",
"description": "Dolibarr 17.0.0 PHP Code Injection Exploit",
"fork": false,
"created_at": "2024-09-20T19:54:22Z",
"updated_at": "2024-09-20T20:05:34Z",
"pushed_at": "2024-09-20T20:05:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]