id: joomla-detect info: name: Joomla! Detect author: ricardomaia severity: info description: | Joomla! is a free and open-source content management system (CMS) for publishing content on websites. reference: - https://www.joomla.org/ - https://github.com/joomla/joomla-cms - https://www.itoctopus.com/how-to-quickly-know-the-version-of-any-joomla-website - https://hackertarget.com/attacking-enumerating-joomla/ classification: cpe: cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:* metadata: verified: true max-request: 5 vendor: joomla product: joomla\\! google-query: Joomla! Administration Login inurl:"/index.php" || intitle:"Joomla Web Installer" tags: tech,joomla,cms,oss http: - method: GET path: - "{{BaseURL}}/administrator/manifests/files/joomla.xml" # >= 1.6.0 - "{{BaseURL}}/language/en-GB/en-GB.xml" # >= 1.5.0 and <= 1.5.26 - "{{BaseURL}}/README.txt" - "{{BaseURL}}/modules/custom.xml" # < 1.5.0 - "{{BaseURL}}" # >= 1.5.0 and <= 1.5.26 stop-at-first-match: true host-redirects: true max-redirects: 2 matchers-condition: or matchers: - type: word part: body words: - "" - "" - "" condition: and - type: regex regex: - '(?i)' - '(?i)Joomla_([\d.|\d]+)_version_history' - 'FILES_JOOMLA_XML_DESCRIPTION' condition: or extractors: - type: regex name: version group: 1 regex: - '(.*?)' - '(?i)Joomla_([\d.|\d]+)_version_history' part: body # digest: 490a00463044022055fe37243598db7761b901480fb821502a56c4e22bbc625dfac9bdfa00a26cec02202174ea6ee48a620e4c915438f8379741d533622baf79913c2280a2d4f6edf950:922c64590222798bb761d5b6d8e72950