Web
Nmap enumerated that the web server is using Drupal 7
Webroot
I can confirm that it is a Drupal website
wappalyzer also checks the CMS
The website is written in PHP
There is a login page at
Username enumeration via error message can be done
droopescan
droopescan is an excellent tool to enumerate Drupal-powered web servers. It’s designed for that.
┌──(kali㉿kali)-[~/archive/htb/labs]
└─$ droopescan scan drupal -u http://$IP:80/ -e a
[+] Plugins found:
ctools http://10.10.10.9:80/sites/all/modules/ctools/
http://10.10.10.9:80/sites/all/modules/ctools/CHANGELOG.txt
http://10.10.10.9:80/sites/all/modules/ctools/changelog.txt
http://10.10.10.9:80/sites/all/modules/ctools/CHANGELOG.TXT
http://10.10.10.9:80/sites/all/modules/ctools/LICENSE.txt
http://10.10.10.9:80/sites/all/modules/ctools/API.txt
libraries http://10.10.10.9:80/sites/all/modules/libraries/
http://10.10.10.9:80/sites/all/modules/libraries/CHANGELOG.txt
http://10.10.10.9:80/sites/all/modules/libraries/changelog.txt
http://10.10.10.9:80/sites/all/modules/libraries/CHANGELOG.TXT
http://10.10.10.9:80/sites/all/modules/libraries/README.txt
http://10.10.10.9:80/sites/all/modules/libraries/readme.txt
http://10.10.10.9:80/sites/all/modules/libraries/README.TXT
http://10.10.10.9:80/sites/all/modules/libraries/LICENSE.txt
services http://10.10.10.9:80/sites/all/modules/services/
http://10.10.10.9:80/sites/all/modules/services/README.txt
http://10.10.10.9:80/sites/all/modules/services/readme.txt
http://10.10.10.9:80/sites/all/modules/services/README.TXT
http://10.10.10.9:80/sites/all/modules/services/LICENSE.txt
profile http://10.10.10.9:80/modules/profile/
php http://10.10.10.9:80/modules/php/
image http://10.10.10.9:80/modules/image/
[+] Themes found:
seven http://10.10.10.9:80/themes/seven/
garland http://10.10.10.9:80/themes/garland/
[+] Possible version(s):
7.54
[+] Possible interesting urls found:
Default changelog file - http://10.10.10.9:80/CHANGELOG.txt
Default admin - http://10.10.10.9:80/user/login
[+] Scan finished (0:50:35.382811 elapsed)
droopescan enumerated the CMS version
Drupal 7.54
Searchsploit
┌──(kali㉿kali)-[~/archive/htb/labs]
└─$ searchsploit drupal 7.54
------------------------------------------------------------------------------------------------------- ---------------------------------
Exploit Title | Path
------------------------------------------------------------------------------------------------------- ---------------------------------
Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit) | php/webapps/44557.rb
Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code Execution (PoC) | php/webapps/44542.txt
Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution | php/webapps/44449.rb
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit) | php/remote/44482.rb
Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC) | php/webapps/44448.py
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) | php/remote/46510.rb
Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution | php/webapps/46452.txt
Drupal < 8.6.9 - REST Module Remote Code Execution | php/webapps/46459.py
------------------------------------------------------------------------------------------------------- ---------------------------------
shellcodes: No Results
papers: No Results
Drupal 7.54
is vulnerable