Web


Nmap discovered a Web server on the target port 80 The running service is Apache httpd 2.4.41 ((Ubuntu))

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/exfiltrated]
└─$ curl -I -X OPTIONS http://$IP/
HTTP/1.1 302 Found
Date: Wed, 02 Apr 2025 09:57:50 GMT
Server: Apache/2.4.41 (Ubuntu)
Set-Cookie: INTELLI_06c8042c3d=ml0vp7reslpt6rbk1kocbehbra; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Set-Cookie: INTELLI_06c8042c3d=ml0vp7reslpt6rbk1kocbehbra; expires=Wed, 02-Apr-2025 10:27:50 GMT; Max-Age=1800; path=/
Location: http://exfiltrated.offsec/
Content-Length: 0
Content-Type: text/html; charset=UTF-8
 
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/exfiltrated]
└─$ curl -I http://$IP/        
HTTP/1.1 302 Found
Date: Wed, 02 Apr 2025 09:57:54 GMT
Server: Apache/2.4.41 (Ubuntu)
Set-Cookie: INTELLI_06c8042c3d=2ur0llr9vmsp089vr01pcgc5c3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Set-Cookie: INTELLI_06c8042c3d=2ur0llr9vmsp089vr01pcgc5c3; expires=Wed, 02-Apr-2025 10:27:54 GMT; Max-Age=1800; path=/
Location: http://exfiltrated.offsec/
Content-Type: text/html; charset=UTF-8

302 to a domain; exfiltrated.offsec

The domain information has been appended to the /etc/hosts file on Kali for local DNS resolution

Webroot It appears to be a Subrion instance.

Subrion CMS is an open source PHP content management system. Source code is available for review

Admin Panel


The admin panel is located at /panel/ endpoint It also leaked the version information; 4.2.1

Default Credential


The default credential works; admin:admin Successfully authenticated and redirected to the admin panel The version is indeed 4.2.1

Version Information


Checking the /changelog.txt file reveals the version information, 3.0.1, which does not match with the version information found in the admin panel

Vulnerabilities


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/exfiltrated]
└─$ searchsploit subrion                 
--------------------------------------------------------------------------------------------- ---------------------------------
 Exploit Title                                                                               |  Path
--------------------------------------------------------------------------------------------- ---------------------------------
Subrion 3.x - Multiple Vulnerabilities                                                       | php/webapps/38525.txt
Subrion 4.2.1 - 'Email' Persistant Cross-Site Scripting                                      | php/webapps/47469.txt
Subrion Auto Classifieds - Persistent Cross-Site Scripting                                   | php/webapps/14391.txt
SUBRION CMS - Multiple Vulnerabilities                                                       | php/webapps/17390.txt
Subrion CMS 2.2.1 - Cross-Site Request Forgery (Add Admin)                                   | php/webapps/21267.txt
subrion CMS 2.2.1 - Multiple Vulnerabilities                                                 | php/webapps/22159.txt
Subrion CMS 4.0.5 - Cross-Site Request Forgery (Add Admin)                                   | php/webapps/47851.txt
Subrion CMS 4.0.5 - Cross-Site Request Forgery Bypass / Persistent Cross-Site Scripting      | php/webapps/40553.txt
Subrion CMS 4.0.5 - SQL Injection                                                            | php/webapps/40202.txt
Subrion CMS 4.2.1 - 'avatar[path]' XSS                                                       | php/webapps/49346.txt
Subrion CMS 4.2.1 - Arbitrary File Upload                                                    | php/webapps/49876.py
Subrion CMS 4.2.1 - Cross Site Request Forgery (CSRF) (Add Amin)                             | php/webapps/50737.txt
Subrion CMS 4.2.1 - Cross-Site Scripting                                                     | php/webapps/45150.txt
Subrion CMS 4.2.1 - Stored Cross-Site Scripting (XSS)                                        | php/webapps/51110.txt
--------------------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results

It would appear that the target Subrion instance suffers from multiple vulnerabilities The RCE vulnerability stands out; CVE-2018-19422

Fuzzing


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/exfiltrated]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://exfiltrated.offsec/FUZZ -ic -e .txt,.html,.php -fc 301
 
        /'___\  /'___\           /'___\       
       /\ \__/ /\ \__/  __  __  /\ \__/       
       \ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\      
        \ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/      
         \ \_\   \ \_\  \ \____/  \ \_\       
          \/_/    \/_/   \/___/    \/_/       
 
       v2.1.0-dev
________________________________________________
 
 :: Method           : GET
 :: URL              : http://exfiltrated.offsec/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
 :: Extensions       : .txt .html .php 
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
 :: Filter           : Response status: 301
________________________________________________
 
.htpasswd.txt           [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 23ms]
.htpasswd.html          [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 23ms]
.htpasswd.php           [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 23ms]
.htaccess.txt           [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 23ms]
.htaccess.html          [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 23ms]
.htaccess.php           [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 24ms]
.htaccess               [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 25ms]
.htpasswd               [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 26ms]
0                       [Status: 200, Size: 21687, Words: 9133, Lines: 581, Duration: 242ms]
actions.php             [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 100ms]
actions.html            [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 116ms]
actions.txt             [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 122ms]
changelog.txt           [Status: 200, Size: 49250, Words: 10094, Lines: 913, Duration: 21ms]
cron.txt                [Status: 200, Size: 43, Words: 1, Lines: 1, Duration: 83ms]
cron.html               [Status: 200, Size: 43, Words: 1, Lines: 1, Duration: 82ms]
cron.php                [Status: 200, Size: 43, Words: 1, Lines: 1, Duration: 90ms]
favicon.ico             [Status: 200, Size: 1150, Words: 10, Lines: 4, Duration: 22ms]
index.php               [Status: 200, Size: 21693, Words: 9133, Lines: 581, Duration: 239ms]
license.txt             [Status: 200, Size: 35147, Words: 5836, Lines: 675, Duration: 22ms]
logout.html             [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 67ms]
logout.txt              [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 72ms]
logout.php              [Status: 302, Size: 0, Words: 1, Lines: 1, Duration: 56ms]
panel.txt               [Status: 200, Size: 6155, Words: 1618, Lines: 107, Duration: 136ms]
panel.html              [Status: 200, Size: 6155, Words: 1618, Lines: 107, Duration: 156ms]
panel.php               [Status: 200, Size: 6155, Words: 1618, Lines: 107, Duration: 168ms]
redirect.php            [Status: 200, Size: 1048, Words: 194, Lines: 34, Duration: 250ms]
redirect.txt            [Status: 200, Size: 1048, Words: 194, Lines: 34, Duration: 262ms]
redirect.html           [Status: 200, Size: 1048, Words: 194, Lines: 34, Duration: 257ms]
robots.txt              [Status: 200, Size: 142, Words: 9, Lines: 8, Duration: 18ms]
robots.txt              [Status: 200, Size: 142, Words: 9, Lines: 8, Duration: 21ms]
server-status           [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 20ms]
sitemap.xml             [Status: 200, Size: 637, Words: 6, Lines: 4, Duration: 23ms]
updates                 [Status: 403, Size: 283, Words: 20, Lines: 10, Duration: 24ms]
web.xml                 [Status: 200, Size: 104, Words: 5, Lines: 3, Duration: 77ms]
webpack.manifest.json   [Status: 200, Size: 76, Words: 4, Lines: 1, Duration: 81ms]
:: Progress: [81912/81912] :: Job [1/1] :: 236 req/sec :: Duration: [0:06:41] :: Errors: 0 ::

N/A