PHP Template Injection
A super user of the target Joomla instance has been compromised.
Checking the template reveals that the
protostar
template is being used as default
It can be edited directly since the current user is a super user
Appending the generated PHP reverse shell payload into the bottom of the
index.php
file of the protostaar
templates.
┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/glasgowsmile]
└─$ curl -s http://$IP/joomla/
Invoking the payload
Initial Foothold established to the
glasgowsmile
host as the www-data
account via injecting a malicious PHP code into an existing template.