JoomlaVS

by Vince
in Blog
Hits: 1784

I stumbled upon this tool while following a link to a website that performs passive scans on various content management systems.  Instead of keeping their scanning technique a mystery, they list a bunch of open source tools that they leverage in parallel.  In addition to Joomscan which is something I already use, they mentioned JoomlaVS. 

The description states:  "JoomlaVS is a Ruby application that can help automate assessing how vulnerable a Joomla installation is to exploitation. It supports basic finger printing and can scan for vulnerabilities in components, modules and templates as well as vulnerabilities that exist within Joomla itself."

I decided to give it a whirl.  When we fire it up with no arguments, we get the help screen:


I went to Vulnhub and grabbed a machine that I knew had Joomla running.  We hit it with Nmap:


Our Nmap scan shows us that it's running Joomla.  When we browse the site:


We fire up JoomlaVS and with the -a option, we're scanning it for all vulnerable extensions:


In the second half of the output, we start to see some items in red which indicate some possible avenues for exploitation:


As a comparison, I ran Joomscan across it and it also found the same exact items.  I don't know that I'd say one is better than the other but I might run these in parallel to see if one proves to be better than the other over time.