Web
Nmap discovered a web server running on the target port 80
Webroot
It appears to be a custom website
Wappalyzer identified technologies involved
it shows that the webserver is running off of umbraco and written in
ASP.NET
umbraco is an open-source content management system (CMS) platform for publishing content on the World Wide Web and intranets.
The “Contact” page has a button to an external link
Admin Panel
Clicking the button led to a login page.
This must be the login page to the administrative web GUI panel for Umbraco CMS
I will use the extracted credential from the NFS share that Remote a backup of the web server
Successfully logged in to the administrative Web GUI panel
I can also see the users.
The
ssmith
user is confirmed to be a valid user for the Umbraco CMS
I also found the version information
Umbraco 7.12.4
Vulnerability
┌──(kali㉿kali)-[~/archive/htb/labs/remote]
└─$ searchsploit Umbraco CMS 7.12.4
------------------------------------------------------------- ---------------------------------
Exploit Title | Path
------------------------------------------------------------- ---------------------------------
Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution | aspx/webapps/46153.py
Umbraco CMS 7.12.4 - Remote Code Execution (Authenticated) | aspx/webapps/49488.py
------------------------------------------------------------- ---------------------------------
shellcodes: No Results
papers: No Results
Umbraco 7.12.4
is vulnerable to RCE