HTTP Verb Tampering


The newly discovered proxy server is locked behind the basic HTTP authentication, which was likely implemented through the Apache’s <Limit> feature mentioned in the note

For the instance above, only valid-user is able to perform POST, PUT, DELETE. However, it also means that everyone else can perform all the rest of the HTTP Methods (GET, CONNECT, OPTIONS, PATCH, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, LOCK, and UNLOCK) exploiting this vulnerability is called http verb tampering

While it appears that the web server is still denying other HTTP method requests to the web root (/), it is possible that it might not be the case with other endpoints. In that case, I would need to find that endpoint.

Endpoint


┌──(kali㉿kali)-[~/archive/htb/labs/gofer]
└─$ ffuf -X POST -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -u http://proxy.gofer.htb/FUZZ -ic -fc 401 -e .php, .txt, .html
________________________________________________
 
 :: Method           : POST
 :: URL              : http://proxy.gofer.htb/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt
 :: Extensions       : .php  
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200,204,301,302,307,401,403,405,500
 :: Filter           : Response status: 401
________________________________________________
[Status: 200, Size: 81, Words: 9, Lines: 2, Duration: 2327ms]
    * FUZZ: index.php

Code 200 is returned for the endpoint at /index.php with POST request

The returned data is very much suggestive; Missing URL parameter ! The endpoint, index.php, takes a URL parameter

Parameter Mining


The parameter was literally url with the value being URL While this finding appears to present a whole other attack vectors, RFI doesn’t appears to be possible

However, the new communication policy mentioned in the note that important documents are only sent internally due to recent phishing attack suggest that there is indeed an internal mail service and it might be accessible via SSRF