• This repository has been archived on 22/Oct/2020
  • Stars
    star
    271
  • Rank 151,717 (Top 3 %)
  • Language
    Ruby
  • License
    GNU General Publi...
  • Created over 9 years ago
  • Updated over 6 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A black box, Ruby powered, Joomla vulnerability scanner

joomlavs Build Status Coverage Status Code Climate

A black box, Ruby powered, Joomla vulnerability scanner

What is it?

JoomlaVS is a Ruby application that can help automate assessing how vulnerable a Joomla installation is to exploitation. It supports basic finger printing and can scan for vulnerabilities in components, modules and templates as well as vulnerabilities that exist within Joomla itself.

How to install

JoomlaVS has so far only been tested on Debian, but the installation process should be similar across most operating systems.

  1. Ensure Ruby [2.4.4 or above] is installed on your system
  2. Clone the source code using git clone https://github.com/rastating/joomlavs.git
  3. Install bundler and required gems using gem install bundler && bundle install

Troubleshooting Installation

If you have issues installing JoomlaVS' dependencies (in particular, Nokogiri), first make sure you have all the tooling necessary to compile C extensions:

sudo apt-get install build-essential patch

Itโ€™s possible that you donโ€™t have important development header files installed on your system. Hereโ€™s what you should do if you should find yourself in this situation:

sudo apt-get install ruby-dev zlib1g-dev liblzma-dev libcurl4-openssl-dev

How to use

The only required option is the -u / --url option, which specifies the address to target. To do a full scan, however, the --scan-all option should also be specified, e.g. ruby joomlavs.rb -u yourjoomlatarget.com --scan-all.

A full list of options can be found below:

usage: joomlavs.rb [options]
Basic options
    -u, --url              The Joomla URL/domain to scan.
    --basic-auth           <username:password> The basic HTTP authentication credentials
    -v, --verbose          Enable verbose mode
Enumeration options
    -a, --scan-all         Scan for all vulnerable extensions
    -c, --scan-components  Scan for vulnerable components
    -m, --scan-modules     Scan for vulnerable modules
    -t, --scan-templates   Scan for vulnerable templates
    -q, --quiet            Scan using only passive methods
Advanced options
    --disable-tls-checks   Disable SSL/TLS certificate verification.
    --follow-redirection   Automatically follow redirections
    --no-colour            Disable colours in output
    --proxy                <[protocol://]host:port> HTTP, SOCKS4 SOCKS4A and SOCKS5 are supported. If no protocol is given, HTTP will be used
    --proxy-auth           <username:password> The proxy authentication credentials
    --threads              The number of threads to use when multi-threading requests
    --user-agent           The user agent string to send with all requests

License

Copyright (C) 2015-2018 rastating

Running JoomlaVS against websites without prior mutual consent may be illegal in your country. The author and parties involved in its development accept no liability and are not responsible for any misuse or damage caused by JoomlaVS.

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.

More Repositories

1

wordpress-exploit-framework

A Ruby framework designed to aid in the penetration testing of WordPress systems.
Ruby
1,016
star
2

shiva

An Ansible playbook to provision a host for penetration testing and CTF challenges
Python
235
star
3

dnmasscan

A script that can resolve an input file of domains and scan them with masscan
Shell
154
star
4

pixel.js

A simple and flexible HTML5 and JavaScript powered game engine.
JavaScript
81
star
5

xss-chef

A web application for generating custom XSS payloads
JavaScript
75
star
6

slae

The source code of the SLAE assignments documented at https://rastating.github.io/
C
23
star
7

pga4decrypt

A tool for recovering server credentials from a pgadmin4 database
Python
20
star
8

DroidBeard

An Android app for managing SickBeard.
Java
15
star
9

Keppy-Steinway-Piano

Click here ->
8
star
10

yaircc

yaircc (pronounced yerk) is a free, open-source IRC client for Windows that complies with the standards set by both RFC 1459 and RFC 2812, and also supports a number of defacto standards that have become a part of many IRC clients over the years, such as custom font colours, action messages and more.
C#
8
star
11

secure-chrome

A collection of registry files to help provide a stricter default configuration of Google Chrome in Windows
7
star
12

LEDDisplay

An Arduino library for controlling double/quad digit common anode 7-segment LED displays.
C++
6
star
13

osce-prep

A collection of exploits that I have written in preparation for sitting the OSCE exam.
Python
4
star
14

Glyphduino

An Arduino library for displaying glyphs on LCD screens compatible with the LiquidCrystal library.
C++
3
star
15

graphly

A jQuery graph rendering plugin
JavaScript
2
star
16

rastating.github.io

HTML
2
star
17

openvpn-monitor

A small application for monitoring OpenVPN to send notifications of important events
C#
2
star
18

steamoverload

A Node.js web app for tracking the game progress of your Steam library
CSS
2
star
19

reaver-wps

Automatically exported from code.google.com/p/reaver-wps
C
2
star
20

ebook-library

A web based e-book library viewer powered by Sinatra and React
Ruby
1
star
21

vlc_to_obs

A Ruby script to output the currently playing track in VLC to a text file for use with OBS
Ruby
1
star
22

readme

An Ansible playbook to build a copy of the CTF box, ReadMe
PHP
1
star
23

KeyCore

A bootable keyboard tester powered by Python and TinyCore
Python
1
star