Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Joomla! Config Dist File

By kannthu

Low
Vidoc logoVidoc Module
#config#exposure#joomla
Description

What is the "Joomla! Config Dist File?"

The "Joomla! Config Dist File" module is designed to detect misconfigurations in the Joomla! content management system. It targets the configuration.php-dist file, which is a file created by Joomla! to save application settings. This module has a low severity level and was authored by oppsec.

Impact

If the configuration.php-dist file is exposed, it could potentially reveal sensitive information about the Joomla! installation, such as database credentials or other configuration details. This information could be exploited by attackers to gain unauthorized access or perform other malicious activities.

How does the module work?

The "Joomla! Config Dist File" module works by sending an HTTP GET request to the "/configuration.php-dist" path. It then applies a series of matching conditions to determine if the file is exposed and contains specific keywords related to Joomla! and its configuration.

Here is an example of the HTTP request:

GET /configuration.php-dist

The module uses the following matching conditions:

- The response body must contain the words "Joomla", "JConfig", and "@package". - The response headers must include the word "text/plain". - The response status code must be 200 (OK).

If all of these conditions are met, the module will report a potential vulnerability.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/configuration.php-d...
Matching conditions
word: Joomla, JConfig, @packageand
word: text/plainand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability