Skip to content

Joomla! Configuration File - Detect

ID: joomla-config-dist-file

Severity: low

Author: oppsec

Tags: config,exposure,joomla

Joomla! configuration.php-dist file was detected.

id: joomla-config-dist-file
info:
name: Joomla! Configuration File - Detect
author: oppsec
severity: low
description: Joomla! configuration.php-dist file was detected.
metadata:
max-request: 1
tags: config,exposure,joomla
http:
- method: GET
path:
- "{{BaseURL}}/configuration.php-dist"
matchers-condition: and
matchers:
- type: word
words:
- "Joomla"
- "JConfig"
- "@package"
condition: and
- type: word
words:
- "text/plain"
part: header
- type: status
status:
- 200
# digest: 4a0a0047304502200d6759226ecbb240c04278dfffbcd85f5497f39db902fdbcc3c62be4a2f61691022100bc86702b0eaac453c2ec5d05897072beb3862a7cd6ea38057ba5c0526fdb26be:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/configs/joomla-config-file.yaml"

View on Github