id: joomla-detect info: name: Joomla! Detect author: ricardomaia severity: info description: | Joomla, also spelled Joomla! (with an exclamation mark) and sometimes abbreviated as J!, is a free and open-source content management system (CMS) for publishing web content on websites. reference: - https://www.joomla.org/ - https://github.com/joomla/joomla-cms - https://www.itoctopus.com/how-to-quickly-know-the-version-of-any-joomla-website - https://hackertarget.com/attacking-enumerating-joomla/ metadata: verified: true google-dork: Joomla! Administration Login inurl:"/index.php" || intitle:"Joomla Web Installer" tags: tech,joomla,cms,oss requests: - method: path: - "{{BaseURL}}" # >= 1.5.0 and <= 1.5.26 - "{{BaseURL}}/language/en-GB/en-GB.xml" # >= 1.5.0 and <= 1.5.26 - "{{BaseURL}}/administrator/manifests/files/joomla.xml" # >= 1.6.0 - "{{BaseURL}}/README.txt" - "{{BaseURL}}/modules/custom.xml" # < 1.5.0 host-redirects: true max-redirects: 2 stop-at-first-match: true matchers-condition: or matchers: - type: regex regex: - '(?i)' - '(?i)Joomla_([\d.|\d]+)_version_history' condition: or - type: word part: body words: - "" - "" - "" condition: and extractors: - type: regex name: version part: body group: 1 regex: - "(?i)(.*)" - '(?i)Joomla_([\d.|\d]+)_version_history'