Web


Nmap discovered a web server running on the target port 80 Webroot It’s just a “Hello world!

Not so much in the source code though. The comments points to a directory /nibbleblog/

/nibbleblog/


Webroot of /nibbleblog/ It’s a Nibbleblog

Nibbleblog is a CMS written in PHP designed for making and managing a blog It’s known to have some vulnerabilities

Wappalyzer identified that it’s written in PHP

Fuzzing


┌──(kali㉿kali)-[~/archive/htb/labs/nibbles]
└─$ ffuf -c -w /usr/share/wordlists/seclists/discovery/web-content/raft-large-files-lowercase.txt -u http://$IP/nibbleblog/FUZZ -ic  
________________________________________________
 
 :: Method           : GET
 :: URL              : http://10.10.10.75/nibbleblog/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/raft-large-files-lowercase.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200,204,301,302,307,401,403,405,500
________________________________________________
 
index.php               [status: 500, Size: 0, Words: 1, Lines: 1, Duration: 81ms]
update.php              [status: 200, Size: 1622, Words: 103, Lines: 88, Duration: 81ms]
feed.php                [status: 200, Size: 300, Words: 8, Lines: 8, Duration: 47ms]
sitemap.php             [status: 200, Size: 401, Words: 33, Lines: 11, Duration: 41ms]
install.php             [status: 200, Size: 78, Words: 11, Lines: 1, Duration: 1340ms]
admin.php               [status: 200, Size: 1401, Words: 79, Lines: 27, Duration: 1351ms]
:: Progress: [35325/35325] :: Job [1/1] :: 920 req/sec :: Duration: [0:00:34] :: Errors: 1 ::
 
┌──(kali㉿kali)-[~/archive/htb/labs/nibbles]
└─$ ffuf -c -w /usr/share/wordlists/seclists/discovery/web-content/directory-list-2.3-big.txt -u http://$IP/nibbleblog/FUZZ/ -ic 
________________________________________________
 
 :: Method           : GET
 :: URL              : http://10.10.10.75/nibbleblog/FUZZ/
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200,204,301,302,307,401,403,405,500
________________________________________________
 
                        [status: 200, Size: 2986, Words: 116, Lines: 61, Duration: 91ms]
content                 [status: 200, Size: 1353, Words: 88, Lines: 19, Duration: 32ms]
themes                  [status: 200, Size: 1741, Words: 112, Lines: 21, Duration: 34ms]
admin                   [status: 200, Size: 2127, Words: 136, Lines: 23, Duration: 34ms]
plugins                 [status: 200, Size: 3777, Words: 232, Lines: 31, Duration: 36ms]
languages               [status: 200, Size: 3167, Words: 208, Lines: 28, Duration: 34ms]
                        [status: 200, Size: 2986, Words: 116, Lines: 61, Duration: 48ms]
[WARN] Caught keyboard interrupt (Ctrl-C)

Fuzzing /nibbleblog/ reveals a few interesting files and directories

This is the structure by far made by Burp Crawler

I will check them out

/nibbleblog/admin/


Directory Indexing is present I don’t see anything too exciting

/nibbleblog/content/


Here looks much more interesting

I found a username in/nibbleblog/content/private/config.xml admin@nibbles.com

/nibbleblog/content/private/users.xml confirms the admin username again This also appears to be a blacklist

/nibbleblog/update.php


The /nibbleblog/update.php revealed the version info Nibbleblog 4.0.3

/nibbleblog/admin.php


There is a login page at the /nibbleblog/admin.php file. It must be leading to the administrative panel

Admin Panel


Attempting some default and weak passwords

Wow. I got logged in. The password was nibbles

┌──(kali㉿kali)-[~/archive/htb/labs/nibbles]
└─$ searchsploit nibbleblog
------------------------------------------------------ ---------------------------------
 Exploit Title                                        |  Path
------------------------------------------------------ ---------------------------------
Nibbleblog 3 - Multiple SQL Injections                | php/webapps/35865.txt
Nibbleblog 4.0.3 - Arbitrary File Upload (Metasploit) | php/remote/38489.rb
------------------------------------------------------ ---------------------------------
Shellcodes: No Results
Papers: No Results

Searchsploit reveals that the web app has a file upload vulnerability. I will search online for exploit since I don’t want to use Metasploit