Web
Nmap discovered a Web service on the target port 80
The running service is Apache httpd 2.4.29 ((Ubuntu))
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/apex]
└─$ curl -I http://$IP/
HTTP/1.1 200 OK
Date: Wed, 05 Feb 2025 19:54:33 GMT
Server: Apache/2.4.29 (Ubuntu)
Last-Modified: Mon, 17 May 2021 15:00:14 GMT
ETag: "711d-5c287d9d2c6e3"
Accept-Ranges: bytes
Content-Length: 28957
Vary: Accept-Encoding
Content-Type: text/html
Webroot
It appears to be a website for a hospital
Updated the
/etc/hosts
file
Fuzzing
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/apex]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://apex.offsec/FUZZ -ic
________________________________________________
:: Method : GET
:: URL : http://apex.offsec/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
.htaccess [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 3790ms]
.htpasswd [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 3848ms]
assets [Status: 301, Size: 311, Words: 20, Lines: 10, Duration: 20ms]
filemanager [Status: 301, Size: 316, Words: 20, Lines: 10, Duration: 36ms]
server-status [Status: 403, Size: 276, Words: 20, Lines: 10, Duration: 25ms]
source [Status: 301, Size: 311, Words: 20, Lines: 10, Duration: 25ms]
thumbs [Status: 301, Size: 311, Words: 20, Lines: 10, Duration: 36ms]
:: Progress: [20478/20478] :: Job [1/1] :: 1574 req/sec :: Duration: [0:00:16] :: Errors: 0 ::
/filemanager/
/source/
/source/
Directory
/source/images
N/A
/source/Documents
The
/source/Documents
directory corresponds to the docs
Samba share
/filemanager
There appears to be another web application running on the
/filemanager
endpoint
It shows the /source directory above
It’s written in PHP
The application is Responsive FileManager
9.13.4
Vulnerabilities
It would appear that the target instance has multiple vulnerabilities;
OpenEMR
There is an endpoint;
/openemr
301
to a login page at /openemr/interface/login/login.php?site=default
It’s hosting a OpenEMR instance