Web


Nmap discovered a Web server on the target port 80 The running service is Microsoft IIS httpd 10.0

Webroot It claims to be a Windows 11 theme repository

Wappalyzer identified technologies involved Interestingly, it uses Application Request Routing (ARR) 3.0 extension for load balancing

About


The “About” section states that the website is a community-driven hub for sharing Windows 11 themes

Themes


The “Themes” section showcases 3 themes that are still in development

Upload


Most importantly, there is an “Upload” section that supports file upload Presumably, custom Windows 11 themes are supposed to be uploaded here as this is the “hub” for sharing

Checking the source code reveals the file upload feature It accepts .theme and .themepack extensions

It also loads a JS file at js/scripts.js

js/scripts.js


It would appear that the POST request from the file upload feature above is made to the /upload endpoint

┌──(kali㉿kali)-[~/archive/htb/labs/aero]
└─$ curl -s -i http://10.10.11.237/upload
HTTP/1.1 405 Method Not Allowed
allow: POST
content-length: 0
server: Microsoft-IIS/10.0
x-powered-by: ARR/3.0
date: Tue, 16 Jan 2024 07:41:00 GMT
 
┌──(kali㉿kali)-[~/archive/htb/labs/aero]
└─$ curl -x post -s -i http://10.10.11.237/upload
HTTP/1.1 411 Length Required
content-type: text/html; charset=us-ascii
server: Microsoft-HTTPAPI/2.0
date: Tue, 16 Jan 2024 07:41:08 GMT
connection: close
content-length: 344

The /upload endpoint only accepts POST method and requires length

testing


┌──(kali㉿kali)-[~/archive/htb/labs/aero]
└─$ echo blahblah > test.theme

I will first create a testing file; test.theme

Upon submitting the test file, the web server provided a JSON response, indicating that the uploaded file or “theme” would be incorporated into the website following a testing process

The duration of this process is unspecified, but it can be inferred that the backend is likely undergoing a series of file executions for testing purposes. Since the system exclusively handles .theme and .themepack files, it is evident that the testing revolves around Windows 11 themes.

Vulnerability


Looking up online for Windows 11 theme vulnerability reveals an interesting entry named, ThemeBleed, or [[Aero_CVE-2023-38146#[CVE-2023-38146](https //nvd.nist.gov/vuln/detail/CVE-2023-38146)|CVE-2023-38146]] The target system might be vulnerable


The footer contains a potential username, support, along with a domain; aerohub.htb

The domain information has been appended to the /etc/hosts file on Kali for local DNS resolution

Fuzzing


┌──(kali㉿kali)-[~/archive/htb/labs/aero]
└─$ ffuf -c -w /usr/share/wordlists/seclists/discovery/web-content/directory-list-lowercase-2.3-medium.txt -t 200 -u http://$IP/FUZZ -ic -ic
________________________________________________
 :: Method           : GET
 :: URL              : http://10.10.11.237/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
                        [status: 200, Size: 11650, Words: 3468, Lines: 187, Duration: 86ms]
home                    [status: 200, Size: 11650, Words: 3468, Lines: 187, Duration: 141ms]
upload                  [status: 405, Size: 0, Words: 1, Lines: 1, Duration: 107ms]
:: Progress: [207630/207630] :: Job [1/1] :: 875 req/sec :: Duration: [0:02:59] :: Errors: 0 ::

Nothing new

Virtual Host / Sub-domain Discovery


┌──(kali㉿kali)-[~/archive/htb/labs/aero]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt -t 200 -u http://$IP/ -H 'Host: FUZZ.aerohub.htb' -ic -mc all -fs 11650
________________________________________________
 :: Method           : GET
 :: URL              : http://10.10.11.237/
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt
 :: Header           : Host: FUZZ.aerohub.htb
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: all
 :: Filter           : Response size: 11650
________________________________________________
:: Progress: [114437/114437] :: Job [1/1] :: 314 req/sec :: Duration: [0:05:54] :: Errors: 0 ::

Nothing found