Web


Nmap discovered a web server on the target port 80 The running service is Apache httpd 2.4.6 and it’s hosting a Drupal instance

Webroot It is indeed hosted by Drupal The earlier Nmap scan revealed that it’s Drupal 7

droopescan


┌──(kali㉿kali)-[~/archive/htb/labs/armageddon]
└─$ droopescan scan drupal -u http://$IP/
[+] Plugins found:                                                              
    profile http://10.10.10.233/modules/profile/
    php http://10.10.10.233/modules/php/
    image http://10.10.10.233/modules/image/
 
[+] Themes found:
    seven http://10.10.10.233/themes/seven/
    garland http://10.10.10.233/themes/garland/
 
[+] Possible version(s):
    7.56
 
[+] Possible interesting urls found:
    Default changelog file - http://10.10.10.233/CHANGELOG.txt
 
[+] Scan finished (0:02:05.142478 elapsed)

droopescan identified the possible version 7.56

Vulnerability


┌──(kali㉿kali)-[~/archive/htb/labs/armageddon]
└─$ searchsploit Drupal 7.56                      
------------------------------------------------------------------------------------------------------ ---------------------------------
 Exploit Title                                                                                        |  Path
------------------------------------------------------------------------------------------------------ ---------------------------------
Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit)                              | php/webapps/44557.rb
Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit)                              | php/webapps/44557.rb
Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code Execution (PoC)                           | php/webapps/44542.txt
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution                   | php/webapps/44449.rb
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit)               | php/remote/44482.rb
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit)               | php/remote/44482.rb
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC)                      | php/webapps/44448.py
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) | php/remote/46510.rb
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) | php/remote/46510.rb
Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution                                        | php/webapps/46452.txt
Drupal < 8.6.9 - REST Module Remote Code Execution                                                    | php/webapps/46459.py
------------------------------------------------------------------------------------------------------ ---------------------------------
shellcodes: No Results
papers: No Results

Drupal 7.56 has a series of critical vulnerabilities While the Drupalgeddon3 exploit requires authentication, the Drupalgeddon2 exploit doesn’t

the drupalgeddon2 exploit targets [[armageddon_cve-2018-7600#cve-2018-7600|CVE-2018-7600]]

Moving on to Exploitation phase.