Web


Nmap discovered a Web server on the target port 443 over SSL The running service is Microsoft IIS httpd 10.0

Webroot

It appears to be identical static web app seen on the port 80

HTTP/2


Except, it uses HTTP/2

There is a known vulnerability where if the target web server is configured to translate incoming HTTP/2 packets back to HTTP/1.1, requests may be forged to contain malicious data in the header field. It only works if the proxy layer wouldn’t check that. However, this appears rather irrelevant in the current assessment

/certsrv


The /certsrv endpoint is also present here over TLS

/certenroll


The /certsrv endpoint can also be seen with the same response from the web server

/staff


While every enumerated endpoint appears identical here over TLS as shown above, the /staff endpoint is different. The web server doesn’t even respond to the request and Burp Suite returns an error instead.

This suggests that whatever resource is hosted at the /staff endpoint does not like being proxied over TLS, resulting in completely ignoring requests

I could access the endpoint using a standalone chromium browser without proxying to Burp Suite However, it still shows the same 403 This endpoint appears rather interesting as it behaves much differently compared to others.

CLEARTEXT Credential in the Image


It turns out that the issue lies in the Our Features section of the static index page

As ridiculous as it appears, there is a CLEARTEXT credential apparently (It would appear that the author wanted to showcase the extremely-highly-unlikely scenario of an organization accidently leaking a CLEARTEXT credential on their website.)

Moving on to the Exploitation phase