Web
Nmap discovered a Web server on the target port 80
The running service is Apache httpd 2.4.29
It appears to be a personal gallery
The Login button leads to an authentication page at
/login.php
Judging by the resources enumerated by the Burp Suite’s passive crawler, there appears to be a file uploading feature somewhere
login.php
The authentication page appears very much straight forward with the POST data
Additionally, if the supplied credential is wrong, it uses JavaScript’s
alert()
method to prompt the user
Authentication Bypass
the
login.php
file is confirmed to be vulnerable to sql injection as i am able to bypass the authentication with the simple sqli technique
While the backend DB is likely using a MySQL based Database, I will continue to enumerate it via the found SQLi vulnerability
I got redirected to another page;
upload.php
As suspected earlier, this appears to be the place that supports file uploading
File Upload
Uploading a testing file;
test.jpg
Supposedly, it should now appear on the main page
As expected, the file is uploaded, but the name appears to have been changed
Looking further into the uploaded image, it is uploaded to the
/images/uploads/
directory with its original name
This would mean that the name for the uploaded image shown in the index.php
file is arbitrary
As expected, the name is arbitrary as it is dynamically changing upon refreshing
As this may be vulnerable and appears to be the way in, I will look further into it