Guest User

Untitled

a guest
Apr 9th, 2020
46
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ./joomlavs.rb --url http://enterprise.htb:8080
  2. ----------------------------------------------------------------------
  3.  
  4.      ██╗ ██████╗  ██████╗ ███╗   ███╗██╗      █████╗ ██╗   ██╗███████╗
  5.      ██║██╔═══██╗██╔═══██╗████╗ ████║██║     ██╔══██╗██║   ██║██╔════╝
  6.      ██║██║   ██║██║   ██║██╔████╔██║██║     ███████║██║   ██║███████╗
  7. ██   ██║██║   ██║██║   ██║██║╚██╔╝██║██║     ██╔══██║╚██╗ ██╔╝╚════██║
  8. ╚█████╔╝╚██████╔╝╚██████╔╝██║ ╚═╝ ██║███████╗██║  ██║ ╚████╔╝ ███████║
  9.  ╚════╝  ╚═════╝  ╚═════╝ ╚═╝     ╚═╝╚══════╝╚═╝  ╚═╝  ╚═══╝  ╚══════╝
  10.  
  11. ----------------------------------------------------------------------
  12.  
  13. [+] URL: http://enterprise.htb:8080
  14. [+] Started: Wed Apr  8 01:08:32 2020
  15.  
  16. [+] Found 2 interesting headers.
  17.  |  Server: Apache/2.4.10 (Debian)
  18.  |  X-Powered-By: PHP/7.0.23
  19.  
  20. [+] Joomla version 3.7.5 identified from admin manifest
  21. [!] Found 0 vulnerabilities affecting this version of Joomla!
  22.  
  23. [+] Scanning for vulnerable components...
  24. [!] Found 1 vulnerable components.
  25.  
  26. ------------------------------------------------------------------
  27.  
  28. [+] Name: com_fields - v3.7.0
  29.  |  Location: http://enterprise.htb:8080/administrator/components/com_fields
  30.  |  Manifest: http://enterprise.htb:8080/administrator/components/com_fields/fields.xml
  31.  |  Description: COM_FIELDS_XML_DESCRIPTION
  32.  |  Author: Joomla! Project
  33.  |  Author URL: www.joomla.org
  34.  
  35. [!] Title: Joomla Component Fields - SQLi Remote Code Execution (Metasploit)
  36.  |  Reference: https://www.exploit-db.com/exploits/44358
  37.  
  38. ------------------------------------------------------------------
  39.  
  40. [+] Scanning for vulnerable modules...
  41. [!] Found 0 vulnerable modules.
  42.  
  43. ------------------------------------------------------------------
  44.  
  45. [+] Scanning for vulnerable templates...
  46. [!] Found 0 vulnerable templates.
  47.  
  48. ------------------------------------------------------------------
  49.  
  50. [+] Finished
RAW Paste Data