Web


Nmap discovered a Web server on the target port 80 The running service is Skipper Proxy

┌──(kali㉿kali)-[~/archive/htb/labs/lantern]
└─$ curl -i http://$IP/                                                                                                            
HTTP/1.1 302 Found
Content-Length: 225
Content-Type: text/html; charset=utf-8
Date: Mon, 19 Aug 2024 09:58:04 GMT
Location: http://lantern.htb/
Server: Skipper Proxy
 
<!doctype html>
<html lang=en>
<title>Redirecting...</title>
<h1>Redirecting...</h1>
<p>You should be redirected automatically to the target URL: <a href="http://lantern.htb/">http://lantern.htb/</a>. If not, click the link.

Skipper Proxy is being used to redirect requests to the domain; lantern.htb

The domain information has been appended to the /etc/hosts file on Kali for local DNS resolution

Webroot It appears to be providing an IT solution

The Testimonials section contains 3 possible users; john doe, maria garcia, and mason miller

Vacancie


The Vacancies button leads to the vacancies endpoint

It showcases available positions

At the bottom, there is a file upload feature

This doesn’t seem as interesting

Fuzzing


┌──(kali㉿kali)-[~/archive/htb/labs/lantern]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -t 200 -u http://lantern.htb/FUZZ -ic
________________________________________________
 :: Method           : GET
 :: URL              : http://lantern.htb/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
                        [Status: 200, Size: 12049, Words: 4549, Lines: 225, Duration: 602ms]
submit                  [Status: 405, Size: 153, Words: 16, Lines: 6, Duration: 2239ms]
vacancies               [Status: 200, Size: 10713, Words: 4106, Lines: 238, Duration: 1552ms]
:: Progress: [1273819/1273819] :: Job [1/1] :: 186 req/sec :: Duration: [0:29:58] :: Errors: 0 ::

Nothing new found

Virtual Host / Sub-domain Discovery


┌──(kali㉿kali)-[~/archive/htb/labs/lantern]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt -u http://$IP/ -H 'Host: FUZZ.lantern.htb' -ic -mc all -fs 225
________________________________________________
 :: Method           : GET
 :: URL              : http://10.129.81.94/
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt
 :: Header           : Host: FUZZ.lantern.htb
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: all
 :: Filter           : Response size: 225
________________________________________________
:: Progress: [114437/114437] :: Job [1/1] :: 240 req/sec :: Duration: [0:30:48] :: Errors: 2 ::

Nothing found

Vulnerability


┌──(kali㉿kali)-[~/archive/htb/labs/lantern]
└─$ searchsploit skipper
-------------------------------------------------------------------- ---------------------------------
 Exploit Title                                                      |  Path
-------------------------------------------------------------------- ---------------------------------
X-Skipper-Proxy v0.13.237 - Server Side Request Forgery (SSRF)      | multiple/remote/51111.txt
-------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results

There is a SSRF vulnerability for Skipper Proxy < 0.13.237 While the version information has not been identified, I will test it out