Web
Nmap Traverxec a web server on the target port 80
The running service is nostromo 1.9.6
Webroot
It appears to provide a designing service for website
There is a section that shows some images loaded from the
/img/portfolio/
directory
The contact form doesn’t appear to be functional
Fuzzing
┌──(kali㉿kali)-[~/archive/htb/labs/traverxec]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP/FUZZ -ic
________________________________________________
:: Method : GET
:: URL : http://10.10.10.165/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200,204,301,302,307,401,403,405,500
________________________________________________
[Status: 301, Size: 314, Words: 19, Lines: 14, Duration: 23ms]
* FUZZ: css
[Status: 301, Size: 314, Words: 19, Lines: 14, Duration: 25ms]
* FUZZ: icons
[Status: 301, Size: 314, Words: 19, Lines: 14, Duration: 23ms]
* FUZZ: img
[Status: 301, Size: 314, Words: 19, Lines: 14, Duration: 24ms]
* FUZZ: js
[Status: 301, Size: 314, Words: 19, Lines: 14, Duration: 24ms]
* FUZZ: lib
:: Progress: [13383/20476] :: Job [1/1] :: 17 req/sec :: Duration: [0:09:34] :: Errors: 387 ::
[WARN] Caught keyboard interrupt (Ctrl-C)
Not only does ffuf find anything new, fuzzing was extremely slow for some reason. No progress made.
nostromo
interesting thing about the target web server is that it’s hosted by nostromo nostromo, also known as nhttpd, is an open-source web server designed by Marcus Glocker. It runs as a single process, and handles normal concurrent connections by select calls, but for efficiency during more demanding connections such as directory listings and CGI execution it forks. It supports HTTP/1.1 and CGI/1.1, Basic access authentication, SSL, IPv6, custom responses, aliases and virtual hosts
The version is 1.9.6
Vulnerability
┌──(kali㉿kali)-[~/archive/htb/labs/traverxec]
└─$ searchsploit nostromo 1.9.6
-------------------------------------------------------- ---------------------------------
Exploit Title | Path
-------------------------------------------------------- ---------------------------------
nostromo 1.9.6 - Remote Code Execution | multiple/remote/47837.py
-------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results
Checking for vulnerability reveals that the target nostromo instance has a [[Traverxec_CVE-2019-16278#[CVE-2019-16278](https //nvd.nist.gov/vuln/detail/CVE-2019-16278)|Remote Code Execution]] vulnerability