Web


Nmap discovered a Web server on the target port 8080 The running service is Jetty 1.0

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pelican]
└─$ curl -I -X OPTIONS http://$IP:8080/
HTTP/1.1 404 Not Found
Content-Length: 0
Server: Jetty(1.0)
 
 
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pelican]
└─$ curl -I http://$IP:8080/        
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=iso-8859-1
Cache-Control: must-revalidate,no-cache,no-store
Content-Length: 1365
Server: Jetty(1.0)

404

Interestingly, sending some special characters results in code 500 and it leaks the underlying technology stack

Fuzzing


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pelican]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt -recursion -u http://$IP:8080/FUZZ -ic
________________________________________________
 :: Method           : GET
 :: URL              : http://192.168.132.98:8080/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-lowercase-2.3-medium.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 40
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
*                       [Status: 500, Size: 3479, Words: 1019, Lines: 57, Duration: 28ms]
:: Progress: [207630/207630] :: Job [1/1] :: 2083 req/sec :: Duration: [0:02:03] :: Errors: 0 ::

N/A

Exhibitor for Zookeeper


An endpoint was discovered from the web server running on the target port 8081, pointing to the /exhibitor/v1/ui/index.html endpoint

Its Exhibitor for the possible Zookeeper instance on the target port 2181 The version is 1.0

Heading over to the Config tab reveals the installation directory as well as the client port, which is 2181

Log tab reveals that there is a cleanup task being executed in the background with an interval of 3 minutes

Vulnerabilities


┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/pelican]
└─$ searchsploit exhibitor
------------------------------------------------ ---------------------------------
 Exploit Title                                  |  Path
------------------------------------------------ ---------------------------------
Exhibitor Web UI 1.7.1 - Remote Code Execution  | java/webapps/48654.txt
------------------------------------------------ ---------------------------------
Shellcodes: No Results
Papers: No Results

Checking the instance for vulnerabilities reveals a remote code execution exploit for the web UI version 1.7.1 Given that the target instance is much older, it might be vulnerable