Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ./joomlavs.rb --url http://enterprise.htb:8080
- ----------------------------------------------------------------------
- ██╗ ██████╗ ██████╗ ███╗ ███╗██╗ █████╗ ██╗ ██╗███████╗
- ██║██╔═══██╗██╔═══██╗████╗ ████║██║ ██╔══██╗██║ ██║██╔════╝
- ██║██║ ██║██║ ██║██╔████╔██║██║ ███████║██║ ██║███████╗
- ██ ██║██║ ██║██║ ██║██║╚██╔╝██║██║ ██╔══██║╚██╗ ██╔╝╚════██║
- ╚█████╔╝╚██████╔╝╚██████╔╝██║ ╚═╝ ██║███████╗██║ ██║ ╚████╔╝ ███████║
- ╚════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ ╚═══╝ ╚══════╝
- ----------------------------------------------------------------------
- [+] URL: http://enterprise.htb:8080
- [+] Started: Wed Apr 8 01:08:32 2020
- [+] Found 2 interesting headers.
- | Server: Apache/2.4.10 (Debian)
- | X-Powered-By: PHP/7.0.23
- [+] Joomla version 3.7.5 identified from admin manifest
- [!] Found 0 vulnerabilities affecting this version of Joomla!
- [+] Scanning for vulnerable components...
- [!] Found 1 vulnerable components.
- ------------------------------------------------------------------
- [+] Name: com_fields - v3.7.0
- | Location: http://enterprise.htb:8080/administrator/components/com_fields
- | Manifest: http://enterprise.htb:8080/administrator/components/com_fields/fields.xml
- | Description: COM_FIELDS_XML_DESCRIPTION
- | Author: Joomla! Project
- | Author URL: www.joomla.org
- [!] Title: Joomla Component Fields - SQLi Remote Code Execution (Metasploit)
- | Reference: https://www.exploit-db.com/exploits/44358
- ------------------------------------------------------------------
- [+] Scanning for vulnerable modules...
- [!] Found 0 vulnerable modules.
- ------------------------------------------------------------------
- [+] Scanning for vulnerable templates...
- [!] Found 0 vulnerable templates.
- ------------------------------------------------------------------
- [+] Finished
Add Comment
Please, Sign In to add comment