Web
Nmap discovered a Web server on the target port 5000
The running service is Werkzeug/3.0.3 Python/3.9.5
Webroot
The web application supports registration and authentication
Creating a testing account
Being redirected to
/dashboard
Redirected to the
/dashboard
endpoint
┌──(kali㉿kali)-[~/archive/htb/labs/chemistry]
└─$ cat example.cif
data_Example
_cell_length_a 10.00000
_cell_length_b 10.00000
_cell_length_c 10.00000
_cell_angle_alpha 90.00000
_cell_angle_beta 90.00000
_cell_angle_gamma 90.00000
_symmetry_space_group_name_H-M 'P 1'
loop_
_atom_site_label
_atom_site_fract_x
_atom_site_fract_y
_atom_site_fract_z
_atom_site_occupancy
H 0.00000 0.00000 0.00000 1
O 0.50000 0.50000 0.50000 1
There is an example
Vulnerability
It would appear that the target web application is processing the CIF file somehow
Looking it up online reveals a fairly recent article
It’s assigned CVE-2024-23346
Looking it up again reveals an GitHub advisory
The target web application might be vulnerable to this