Virtual Host


The PDF file from the School File Management System platform for the student, Kelly Shane, contained a new virtual host; mastermailer.seventeen.htb

Newly discovered virtual host information has been appended to the /etc/hosts file on Kali for local DNS resolution

┌──(kali㉿kali)-[~/archive/htb/labs/seventeen]
└─$ curl -s -i http://mastermailer.seventeen.htb/                                       
HTTP/1.1 302 Found
date: Tue, 20 Jun 2023 00:39:29 GMT
server: Apache/2.4.29 (Ubuntu)
location: http://mastermailer.seventeen.htb:8000/mastermailer/
content-type: text/html; charset=iso-8859-1

Just like the other virtual host, oldmanagement.seventeen.htb, mastermailer.seventeen.htb is hosted over the web server running on the port 8000 over HTTP The port 80 is just a proxy

Another important thing to note is that it is using HTTP. Not HTTPs. That was likely just a typo

mastermailer


As expected, it’s a roundcube instance I don’t have any credential at the moment as I was unable to crack the password hash extracted earlier

Version information is available at /mastermailer/CHANGELOG It’s using 1.4.2

RoundCube 1.4.2 has many vulnerabilities The majority of the vulnerabilities above are XSS attack, which is rather irrelevant to this scenario as there appears to be no user interaction

However, These two vulnerabilities appears most relevant

  • CVE-2020-12640
  • [[Seventeen_CVE-2020-12641#[CVE-2020-12641](https //nvd.nist.gov/vuln/detail/CVE-2020-12641)|CVE-2020-12641]]