githubEdit

Joomla

Discovery

# Check robots.txt for Joomla paths
curl http://TARGET/robots.txt

# Version in XML
curl -s http://TARGET/administrator/manifests/files/joomla.xml | grep version

# README file
curl -s http://TARGET/README.txt | head

# Login page
/administrator/

Enumeration Tools

JoomScan

# Install
apt install joomscan

# Basic scan
joomscan -u http://TARGET

# Enumerate components
joomscan -u http://TARGET -ec

droopescan


CVE-2023-23752 - Information Disclosure (Unauthenticated)

Affects: Joomla 4.0.0 - 4.2.7

Leaks usernames and database credentials via REST API without authentication.

Manual Exploitation

Automated Exploit


Template Editor RCE (Authenticated)

  1. Login to /administrator with admin creds

  2. Navigate: Extensions → Templates → Templates

  3. Select a template (e.g., protostar)

  4. Edit error.php or another file

  5. Add PHP web shell:

  1. Save and access:


Webshell Plugin Upload (Authenticated)

Alternative to template editing - upload a malicious module.

Setup

Upload

  1. Login to /administrator

  2. Navigate: System → Install → Extensions

    • Or directly: /administrator/index.php?option=com_installer&view=install

  3. Upload the ZIP file

  4. "Installation of the module was successful"

Execute Commands


CVE-2019-10945 (Directory Traversal)

Affects: Joomla 1.5.0 - 3.9.4

Requires: Valid admin credentials

Exploit

PoC: https://www.exploit-db.com/exploits/46710


Config File


Important Paths

Path
Description

/administrator/

Admin login

/configuration.php

Main config (DB creds)

/templates/

Template files

/plugins/

Plugin directory

/components/

Components

/modules/

Modules


Default Credentials

Last updated