JoomScan
OWASP JoomScan is a Joomla vulnerability scanner that detects vulnerabilities in Joomla CMS installations. It enumerates versions, checks for core vulnerabilities, and identifies exposed directories, files, and configurations.
Description
JoomScan, short for Joomla Vulnerability Scanner, is a Perl-based tool from the OWASP project designed to scan Joomla CMS installations for security issues. It helps identify potential vulnerabilities by detecting the Joomla version, checking core vulnerabilities, and probing for common misconfigurations such as directory listings, admin pages, robots.txt exposures, and backup or log files.
Use cases include reconnaissance during penetration testing of web applications running Joomla, verifying secure configurations, and generating reports on findings. The tool produces HTML and text reports saved in /usr/share/joomscan/reports/ for easy review and sharing.
It supports proxy usage, custom user-agents, and component enumeration, making it adaptable for various scanning scenarios while respecting connection timeouts and cookies.
How It Works
JoomScan connects to the target Joomla URL via HTTP, detects the Joomla version from core files, and checks against a vulnerability database for known issues. It enumerates directories for listings, scans for admin panels, parses robots.txt for hidden paths, and probes for sensitive files like config.php backups, Apache status pages, and common logs using pattern matching and direct requests.
Installation
sudo apt install joomscanFlags
Examples
joomscan -u http://localhost/joomscan -u http://192.168.1.202/joomlajoomscan -u http://localhost/ --enumerate-componentsjoomscan -u http://localhost/ --cookie "session=abc123"joomscan -u http://localhost/ --user-agent "Mozilla/5.0"joomscan -u http://localhost/ --random-agentjoomscan -u http://localhost/ --proxy http://127.0.0.1:8080joomscan -h