Web


Nmap discovered a Web server on the port 61777 of the CyberLens(10.10.53.112) host. The running service is Jetty 8.y.z-SNAPSHOT

┌──(kali㉿kali)-[~/archive/thm/cyberlens]
└─$ curl -I -X OPTIONS http://$IP:61777/                                                                      
HTTP/1.1 200 OK
Allow: POST,GET,PUT,OPTIONS,HEAD
Date: Sat, 05 Jul 2025 13:09:12 GMT
Content-Length: 0
Server: Jetty(8.y.z-SNAPSHOT)
 
 
┌──(kali㉿kali)-[~/archive/thm/cyberlens]
└─$ curl -I http://$IP:61777/        
HTTP/1.1 200 OK
Content-Type: text/plain
Date: Sat, 05 Jul 2025 13:09:16 GMT
Content-Length: 1458
Server: Jetty(8.y.z-SNAPSHOT)

Webroot It’s Apache Tik server; 1.17 All the endpoints are listed

Apache Tika is a content detection and analysis framework, written in Java, stewarded at the Apache Software Foundation. It detects and extracts metadata and text from over a thousand different file types, and as well as providing a Java library, has server and command-line editions suitable for use from other programming languages.

Vulnerabilities


┌──(kali㉿kali)-[~/archive/thm/cyberlens]
└─$ searchsploit Apache Tika
---------------------------------------------------------------- ---------------------------------
 Exploit Title                                                  |  Path
---------------------------------------------------------------- ---------------------------------
Apache Tika 1.15 - 1.17 - Header Command Injection (Metasploit) | windows/remote/47208.rb
Apache Tika-server < 1.18 - Command Injection                   | windows/remote/46540.py
---------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results

It would appear that Apache Tika 1.17 is vulnerable to an unauthenticatedOS_Command_Injection vulnerability; CVE-2018-1335