Tryhackme || Joomify Walkthrough

Nihir Zala
2 min readAug 9, 2024

--

Overview: Joomla is a free and open-source content management system (CMS) widely used to build blogging websites. At the time of writing, the platform ranks 5th, surpassing other vital platforms like Bitrix, Drupal, etc. In Feb 2023, the platform identified a vulnerability that allowed unauthorized users to fetch information from various web endpoints without prior authentication. The vulnerability was identified by Zewei Zhang from NSFOCUS TIANJI Lab and was assigned the severity Medium and CVE-ID 2023-23752.

Task1:

1)I can successfully connect with the machine.

Ans: No answer is needed

Task2:

2)What folder name contains the index.php code responsible for handling the API-based calls?

Ans: api

3)What folder name contains all the admin-related files and code in Joomla?

Ans: administrator

4)What GET request variable name can the attacker manipulate to trigger CVE 2023–23572?

Ans: public

Task3:

5)What is the admin user’s email address for the vulnerable Joomla application?

Ans: root@root.thm

6)What is the password for the database user root?

Ans: root@123

7)What is the HTTP response code if an API endpoint is accessed without setting the public variable as true?

Ans: 401

8)What is the website address for contact ID 1 of the vulnerable Joomla application?

Ans: https://zuck.thm

Task4:

9)In the monitoring tab of the Alerting section, what is the name of the alert that detects a Joomla exploit attempt?

Ans: Joomla Exploit Alert

Task5:

10)I have completed the room.

Ans: No answer is needed

Thank you for your time and attention.

--

--

Nihir Zala

Hi there, I'm Nihir Zala—a Laravel developer from Gujrat, India, with over 2.5 years of professional experience. I also learning Penetesting from THM and HTB.