SSRF


Following up with the discovered vulnerability

I will create a new basket, ssrf

There is the token to access the newly created basket; pPe5pCeaycdY-xZoVmeskvXCGTyLUJuMAgcmCXYrLW9P

This configuration will make the web app to fetch whatever is in the internal port 80

Accessing the newly created endpoint, /ssrf, I can confirm that there is something running in the internal port 80 The site appears broken due to either incomplete path to resource files as I am accessing it through the proxy or disabled JS Nevertheless, I can see that this site is powered by maltrail 0.53

Maltrail


maltrail is an open source malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails

It seems rather fair that this application was running on the internal network intended to monitor the activity of the other application on the port 55555

Vulnerability


Upon searching online, I found an article talking about a OS command Injection vulnerability present in the maltrail app <= 0.54 The target instance is running the outdated 0.53 Moving on to the Exploitation phase