Web


Nmap discovered a web service on the target port 55555

While Nmap was unable to identify the specific web technology, the web server itself is pointing to an endpoint at /web

The /web page seems to be hosting a service

the footer reveals that the application is request-baskets 1.2.1

the application is an open source project available via the github page According to the description, the application is a web service to collect arbitrary HTTP requests and inspect them via RESTful API or simple web UI

Features


Upon creating a new “basket”, I am given a token

It states that all the request to the created endpoint (/blahblah), will be captured

It indeed captured my GET request to the created endpoint and displayed the header information

response


One of the buttons in the header allows me to configure the response

┌──(kali㉿kali)-[~/archive/htb/labs/sau]
└─$ curl -i http://$IP:55555/blahblah
HTTP/1.1 200 OK
header1: this is header 1
header2: this is header 2
date: Mon, 10 Jul 2023 20:14:49 GMT
content-length: 43
content-type: text/plain; charset=utf-8
 
This is a testing response to a GET request

It indeed works

proxy


It appear that the web application is capable of functioning as a proxy as it allows me to set the forward URL The Proxy Sesponse option seem to be setting whether or not if it would return the response as well

This could be vulnerable to SSRF I will first test out the proxy feature.

┌──(kali㉿kali)-[~/archive/htb/labs/sau]
└─$ echo 'testing abc abc abc' > test2.txt
 
┌──(kali㉿kali)-[~/archive/htb/labs/sau]
└─$ simplehttp . 80
Serving HTTP on 0.0.0.0 port 80 (http://0.0.0.0:80/) ...

I will first create a testing file (test2.txtd) with some content in it and serve it over HTTP on Kali

Then I will set the proxy configuration as above By setting it up this way, requests to the created endpoint (/test2), will be forwarded to the Kali’s web server, hosting the testing file (test2.txt)

Confirmed.

Kali’s web server also logged the GET request made by the target web application

Vulnerability


Looking up the target web app instance for vulnerability reveals that it’s indeed suffering from a SSRF vulnerability; [[Sau_CVE-2023-27163#[CVE-2023-27163](https //nvd.nist.gov/vuln/detail/CVE-2023-27163)|CVE-2023-27163]]