Web
Nmap discovered a Web server on the target port 10000
The running service is MiniServ 1.910 (Webmin httpd)
Heading over to the web root reveals that the web server is running over SSL
It also shows the hostname;
Postman
The host information has been appended to the
/etc/hosts
file on Kali for local DNS resolution
as expected, the web root is a login page for webmin
webmin is a web-based server management control panel for unix-like systems. Webmin allows the user to configure operating system internals, such as users, disk quotas, services and configuration files, as well as modify and control open-source apps, such as BIND, Apache HTTP Server, PHP, and MySQL
I got IP-blocked while I was trying a few known default credentials.
This would mean that brute-forcing the login page is pretty much out of the window due to the presence of the security restriction
Vulnerabilities
┌──(kali㉿kali)-[~/archive/htb/labs/postman]
└─$ searchsploit Webmin 1.910
------------------------------------------------------------------------------ ---------------------------------
Exploit Title | Path
------------------------------------------------------------------------------ ---------------------------------
Webmin 1.910 - 'Package Updates' Remote Command Execution (Metasploit) | linux/remote/46984.rb
Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) | linux/webapps/47330.rb
------------------------------------------------------------------------------ ---------------------------------
Shellcodes: No Results
Papers: No Results
It would appear that the target Webmin instance suffers from a RCE vulnerability However, it requires authentication and I don’t have a valid credential