mirror of
https://github.com/daffainfo/AllAboutBugBounty.git
synced 2024-12-19 19:06:13 +00:00
43 lines
1.2 KiB
Markdown
43 lines
1.2 KiB
Markdown
# Grafana
|
|
|
|
## Introduction
|
|
What would you do if you came across a website that uses Joomla ?
|
|
|
|
## How to Detect
|
|
Try to HTTP request to `https://example.com/` and if you see the source code, you will see something like this `<meta name="generator" content="Joomla! - Open Source Content Management" />`
|
|
|
|
1. Find the related CVE by checking the core, plugins, and theme version
|
|
* How to find the joomla version
|
|
```
|
|
https://target.com/administrator/manifests/files/joomla.xml
|
|
```
|
|
|
|
* How to find the joomla plugin version
|
|
```
|
|
https://target.com/administrator/components/com_NAMEPLUGIN/NAMEPLUGIN.xml
|
|
|
|
for example
|
|
|
|
https://target.com/administrator/components/com_contact/contact.xml
|
|
```
|
|
|
|
> or change NAMEPLUGIN.xml to `changelog.txt` or `readme.md` or `readme.txt`
|
|
|
|
* How to find the theme version
|
|
```
|
|
https://target.com/wp-content/themes/THEMENAME/style.css
|
|
https://target.com/wp-content/themes/THEMENAME/readme.txt (If they have readme file)
|
|
```
|
|
If you found outdated core / plugins, find the exploit at https://exploit-db.com
|
|
|
|
2. Joomla! Config Dist File
|
|
```
|
|
https://example.com/configuration.php-dist
|
|
```
|
|
3. Database File List
|
|
```
|
|
https://example.com/libraries/joomla/database/
|
|
```
|
|
|
|
## References
|
|
- [Exploit-db #6377](https://www.exploit-db.com/ghdb/6377) |