Web
Nmap discovered a Web server on the target port 3000
The running service is Grafana http
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fanatastic]
└─$ curl -I -X OPTIONS http://$IP:3000/
HTTP/1.1 302 Found
Cache-Control: no-cache
Expires: -1
Location: /login
Pragma: no-cache
Set-Cookie: redirect_to=%2F; Path=/; HttpOnly; SameSite=Lax
X-Content-Type-Options: nosniff
X-Frame-Options: deny
X-Xss-Protection: 1; mode=block
Date: Wed, 02 Apr 2025 12:22:12 GMT
Content-Length: 0
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fanatastic]
└─$ curl -I http://$IP:3000/
HTTP/1.1 302 Found
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Location: /login
Pragma: no-cache
Set-Cookie: redirect_to=%2F; Path=/; HttpOnly; SameSite=Lax
X-Content-Type-Options: nosniff
X-Frame-Options: deny
X-Xss-Protection: 1; mode=block
Date: Wed, 02 Apr 2025 12:22:17 GMT
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fanatastic]
└─$ curl -i http://$IP:3000/
HTTP/1.1 302 Found
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Location: /login
Pragma: no-cache
Set-Cookie: redirect_to=%2F; Path=/; HttpOnly; SameSite=Lax
X-Content-Type-Options: nosniff
X-Frame-Options: deny
X-Xss-Protection: 1; mode=block
Date: Wed, 02 Apr 2025 12:22:22 GMT
Content-Length: 29
<a href="/login">Found</a>.
302
to a login page; /login
It’s a login page to a Grafana instance
No credential is known at this time.
Grafana is a multi-platform open source analytics and interactive visualization web application. It can produce charts, graphs, and alerts for the web when connected to supported data sources.
Version Information
It revealed the version information;
v8.3.0 (914fcedb72)
Vulnerabilities
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fanatastic]
└─$ searchsploit grafana 8.3.0
------------------------------------------------------------- ---------------------------------
Exploit Title | Path
------------------------------------------------------------- ---------------------------------
Grafana 8.3.0 - Directory Traversal and Arbitrary File Read | multiple/webapps/50581.py
------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results
The target Grafana instance suffers from a directory traversal and arbitrary file read vulnerability; CVE-2021-43798
Fuzzing
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/fanatastic]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP:3000/FUZZ -ic -fc 302
________________________________________________
:: Method : GET
:: URL : http://192.168.202.181:3000/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
:: Filter : Response status: 302
________________________________________________
api-doc [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
api [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
api_test [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
api2 [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
apicache [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
apimage [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
apis [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
api4 [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
api3 [Status: 401, Size: 32, Words: 4, Lines: 4, Duration: 70ms]
login [Status: 200, Size: 28039, Words: 1924, Lines: 192, Duration: 22ms]
metrics [Status: 200, Size: 49464, Words: 1741, Lines: 694, Duration: 29ms]
robots.txt [Status: 200, Size: 26, Words: 3, Lines: 3, Duration: 25ms]
signup [Status: 200, Size: 27990, Words: 1924, Lines: 192, Duration: 37ms]
verify [Status: 200, Size: 27990, Words: 1924, Lines: 192, Duration: 39ms]
:: Progress: [20478/20478] :: Job [1/1] :: 1449 req/sec :: Duration: [0:00:14] :: Errors: 0 ::
N/A