WDavid404 / PG-Box

PG box workthough note
0 stars 0 forks source link

Hub (easy, Linux,2023) -- FuguHub 8.4 still use exploit for 8.1 #21

Open WDavid404 opened 4 months ago

WDavid404 commented 4 months ago

Key points:

WDavid404 commented 4 months ago
PORT     STATE SERVICE  REASON         VERSION
22/tcp   open  ssh      syn-ack ttl 61 OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)

80/tcp   open  http     syn-ack ttl 61 nginx 1.18.0
|_http-title: 403 Forbidden
| http-methods: 
|_  Supported Methods: GET HEAD POST
|_http-server-header: nginx/1.18.0

8082/tcp open  http     syn-ack ttl 61 Barracuda Embedded Web Server
| http-methods: 
|   Supported Methods: OPTIONS GET HEAD PROPFIND PATCH POST PUT COPY DELETE MOVE MKCOL PROPPATCH LOCK UNLOCK
|_  Potentially risky methods: PROPFIND PATCH PUT COPY DELETE MOVE MKCOL PROPPATCH LOCK UNLOCK
|_http-server-header: BarracudaServer.com (Posix)
| http-webdav-scan: 
|   Server Date: Fri, 19 Jul 2024 15:11:09 GMT
|   WebDAV type: Unknown
|   Server Type: BarracudaServer.com (Posix)
|_  Allowed Methods: OPTIONS, GET, HEAD, PROPFIND, PATCH, POST, PUT, COPY, DELETE, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK
|_http-favicon: Unknown favicon MD5: FDF624762222B41E2767954032B6F1FF
|_http-title: Home

9999/tcp open  ssl/http syn-ack ttl 61 Barracuda Embedded Web Server
|_http-favicon: Unknown favicon MD5: FDF624762222B41E2767954032B6F1FF
| http-webdav-scan: 
|   Server Date: Fri, 19 Jul 2024 15:11:10 GMT
|   WebDAV type: Unknown
|   Server Type: BarracudaServer.com (Posix)
|_  Allowed Methods: OPTIONS, GET, HEAD, PROPFIND, PATCH, POST, PUT, COPY, DELETE, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK
| ssl-cert: Subject: commonName=FuguHub/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:FuguHub, DNS:FuguHub.local, DNS:localhost
| Issuer: commonName=Real Time Logic Root CA/organizationName=Real Time Logic 

Barracuda Embedded Web Server ---> https://www.exploit-db.com/exploits/40177 ?

Access 8082 web page ---> http://192.168.218.25:8082/Config-Wizard/wizard/SetAdmin.lsp

Register a new account called "admin" --> succeeded. Go to "Web-server-file" tab page and then "/fs" image

/about page --> FuguHub 8.4 --> No exploit info for v8.4 (But found https://www.exploit-db.com/exploits/51550 --> for v8.1)

Upload a php file --> succeed. --> but don't find a way to call this file

In the end, try to use https://www.exploit-db.com/exploits/51550 (Edit 51550.py : https://{url}:443 --> http://{url}:8082, https://{url}:443/fs/cmsdocs/ --> http://{url}:8082/fs/) image image