Web


Nmap discovered a web server on the target port 80 The running service is Indy httpd 18.1.37.13946 (Paessler PRTG bandwidth monitor)

Webroot It’s the web application for the PRTG Network Monitor

Authentication


Attempting to authenticate to the web application using the credential found fails

I tried again by changing the password to PrTg@dmin2019 and it worked.

It somewhat make sense considering that the credential was found in the older configuration backup file, which was made in the year 2018 The later configuration file was last modified in the year 2019

Vulnerability


┌──(kali㉿kali)-[~/archive/htb/labs/netmon]
└─$ searchsploit PRTG
------------------------------------------------------------------------------ ---------------------------------
 Exploit Title                                                                |  Path
------------------------------------------------------------------------------ ---------------------------------
PRTG Network Monitor 18.2.38 - (Authenticated) Remote Code Execution          | windows/webapps/46527.sh
PRTG Network Monitor 20.4.63.1412 - 'maps' Stored XSS                         | windows/webapps/49156.txt
PRTG Network Monitor < 18.1.39.1648 - Stack Overflow (Denial of Service)      | windows_x86/dos/44500.py
PRTG Traffic Grapher 6.2.1 - 'url' Cross-Site Scripting                       | java/webapps/34108.txt
------------------------------------------------------------------------------ ---------------------------------
shellcodes: No Results
papers: No Results

Searching for exploits on the local Exploit-DB shows an authenticated RCE Although it targets the version 18.2.38, the target web application is likely vulnerable as it is fairly close; 18.1.37.13946 the bash script itself targets [[netmon_cve-2018-9276#cve-2018-9276|CVE-2018-9276]]