Web
Nmap discovered a Web server on the target port 80
The running service is Apache httpd 2.2.14 ((Ubuntu))
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/zenphoto]
└─$ curl -I -X OPTIONS http://$IP/
HTTP/1.1 200 OK
Date: Mon, 24 Mar 2025 16:54:33 GMT
Server: Apache/2.2.14 (Ubuntu)
Allow: GET,HEAD,POST,OPTIONS
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/zenphoto]
└─$ curl -I http://$IP/
HTTP/1.1 200 OK
Date: Mon, 24 Mar 2025 16:54:39 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Wed, 09 Nov 2011 11:30:14 GMT
ETag: "21137-4b-4b14b9c8d6823"
Accept-Ranges: bytes
Content-Length: 75
Vary: Accept-Encoding
Content-Type: text/html
Webroot
Fuzzing
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/zenphoto]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt -u http://$IP/FUZZ -ic
________________________________________________
:: Method : GET
:: URL : http://192.168.132.41/FUZZ
:: Wordlist : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
.htaccess [Status: 403, Size: 291, Words: 21, Lines: 11, Duration: 24ms]
.htpasswd [Status: 403, Size: 291, Words: 21, Lines: 11, Duration: 3264ms]
cgi-bin/ [Status: 403, Size: 290, Words: 21, Lines: 11, Duration: 20ms]
index [Status: 200, Size: 75, Words: 2, Lines: 5, Duration: 19ms]
test [Status: 301, Size: 315, Words: 20, Lines: 10, Duration: 19ms]
server-status [Status: 403, Size: 295, Words: 21, Lines: 11, Duration: 5028ms]
:: Progress: [20478/20478] :: Job [1/1] :: 70 req/sec :: Duration: [0:00:16] :: Errors: 0 ::
/test/
/test/
The
/test/
endpoint hosts Zenphoto
Source code leaks the version information;
1.4.1.4
Vulnerabilities
┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/zenphoto]
└─$ searchsploit zenphoto 1.4.1.4
------------------------------------------------------------------ ---------------------------------
Exploit Title | Path
------------------------------------------------------------------ ---------------------------------
ZenPhoto 1.4.1.4 - 'ajax_create_folder.php' Remote Code Execution | php/webapps/18083.php
------------------------------------------------------------------ ---------------------------------
Shellcodes: No Results
Papers: No Results
ZenPhoto 1.4.1.4
suffers from a RCE vulnerability