PHP Template Injection


A super user of the target Joomla instance has been compromised.

Checking the template reveals that the protostar template is being used as default

It can be edited directly since the current user is a super user

Appending the generated PHP reverse shell payload into the bottom of the index.php file of the protostaar templates.

┌──(kali㉿kali)-[~/PEN-200/PG_PLAY/glasgowsmile]
└─$ curl -s http://$IP/joomla/

Invoking the payload

Initial Foothold established to the glasgowsmile host as the www-data account via injecting a malicious PHP code into an existing template.