Web


Nmap discovered a web server on the target port 5000 The service running is Werkzeug httpd 0.16.1 (Python 3.8.5)

werkzeug is a Python library that provides a set of utilities for building web applications. It is designed to be simple, lightweight, and flexible, allowing developers to choose the components they need for their projects. Werkzeug includes features such as URL routing, request and response handling, and cookie and session management, making it a useful tool for building both simple and complex web applications.

Webroot It appears that the web server is hosting 3 penetration testing tools

Wappalyzer identified technologies involved. It is indeed a Flask app, written in Python 3.8.5

Nmap


The nmap form takes an IP address and send out a POST request to perform a scan

I tried some injection techniques, but none of them worked

payloads


The payloads section appears to be using msfvenom to generate a payload The interesting thing about it is that it support a file upload for template file

Vulnerability


Looking it up on Google, I see that the first result shows a vulnerability present in Metasploit; [[ScriptKiddie_CVE-2020-7384#CVE-2020-7384|CVE-2020-7384]]

According to the article, the vulnerability affects the following product;

  • Metasploit Framework <= 6.0.11
  • Metasploit Pro <= 4.18.0

While I have not confirm the version of Metasploit Framework that the target web application is using, it is very likely vulnerable as the most recent release of Metasploit Framework is 6.3.5 as of March 2, 2023

Moving on to the Exploitation phase

sploits


The sploits section supports the searchsploit tool

As shown above, it works fine.

Injection doesn’t seem to be available.