Web


Nmap discovered a Web server on the target port 80 The running service is Apache httpd 2.4.18

Webroot It’s the default installation page for Apache

Fuzzing


┌──(kali㉿kali)-[~/archive/thm/lazyadmin]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt -t 200 -u http://$IP/FUZZ -ic
________________________________________________
 :: Method           : GET
 :: URL              : http://10.10.187.138/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/directory-list-2.3-big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
                        [Status: 200, Size: 11321, Words: 3503, Lines: 376, Duration: 236ms]
content                 [Status: 301, Size: 316, Words: 20, Lines: 10, Duration: 35ms]
server-status           [Status: 403, Size: 278, Words: 20, Lines: 10, Duration: 38ms]
:: Progress: [1273820/1273820] :: Job [1/1] :: 223 req/sec :: Duration: [0:04:41] :: Errors: 256 ::

ffuf discovered an endpoints;/content

/content/


The /content/ directory hosts SweetRice

Version Information


Vulnerabilities


┌──(kali㉿kali)-[~/archive/thm/lazyadmin]
└─$ searchsploit sweetrice 1.5
----------------------------------------------------------------------- ---------------------------------
 Exploit Title                                                         |  Path
----------------------------------------------------------------------- ---------------------------------
SweetRice 1.5.1 - Arbitrary File Download                              | php/webapps/40698.py
SweetRice 1.5.1 - Arbitrary File Upload                                | php/webapps/40716.py
SweetRice 1.5.1 - Backup Disclosure                                    | php/webapps/40718.txt
SweetRice 1.5.1 - Cross-Site Request Forgery                           | php/webapps/40692.html
SweetRice 1.5.1 - Cross-Site Request Forgery / PHP Code Execution      | php/webapps/40700.html
----------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
Papers: No Results

There are many vulnerabilities affecting SweetRice 1.5.1. The target instance being SweetRice 1.5.0, it’s likely vulnerable to all the exploits listed above

I will first try out the Backup Disclosure vulnerability Then, I will go for PHP Code Execution

Fuzzing /content/


┌──(kali㉿kali)-[~/archive/thm/lazyadmin]
└─$ ffuf -c -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt  -t 200 -u http://$IP/content/FUZZ -ic
________________________________________________
 :: Method           : GET
 :: URL              : http://10.10.187.138/content/FUZZ
 :: Wordlist         : FUZZ: /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt
 :: Follow redirects : false
 :: Calibration      : false
 :: Timeout          : 10
 :: Threads          : 200
 :: Matcher          : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
.htpasswd               [Status: 403, Size: 278, Words: 20, Lines: 10, Duration: 481ms]
_themes                 [Status: 301, Size: 324, Words: 20, Lines: 10, Duration: 84ms]
as                      [Status: 301, Size: 319, Words: 20, Lines: 10, Duration: 74ms]
attachment              [Status: 301, Size: 327, Words: 20, Lines: 10, Duration: 80ms]
.htaccess               [Status: 403, Size: 278, Words: 20, Lines: 10, Duration: 2084ms]
images                  [Status: 301, Size: 323, Words: 20, Lines: 10, Duration: 400ms]
inc                     [Status: 301, Size: 320, Words: 20, Lines: 10, Duration: 243ms]
js                      [Status: 301, Size: 319, Words: 20, Lines: 10, Duration: 120ms]
:: Progress: [20476/20476] :: Job [1/1] :: 137 req/sec :: Duration: [0:01:04] :: Errors: 126 ::

ffuf found several other endpoints;

  • /content/as
  • /content/inc

/content/as


This is the login page

I should be able to use the obtained credential;

Successfully authenticated