Let's enumerate the FTP Server and see if we can get any sensitive/conf files.
Enumerating webserver (Microsoft HTTPAPI)
There's a Umbraco CMS (Content Management System) running and we can search for potential exploits, but first we will run a gobuster scan in the background.
Umbraco is an open-source content management system platform for publishing content on the World Wide Web and intranets. It is written in C# and deployed on Microsoft based infrastructure.
gobuster dir -w /opt/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://10.10.10.180/ -o gob-dir-scan.out -t 50
There are certain exploits available for this CMS but we need to enumerate the version used.
NFS, or Network File System, is a collaboration system developed by Sun Microsystems in the early 80s that allows users to view, store, update or share files on a remote computer as though it was a local computer.
mount -t nfs 10.10.10.180:/site_backups /mnt/backups -o nolock
So the configuration file for Umbraco CMS is stored in Umbraco.sdf file which contains the usernames and passwords. The file is located at App_data/Umbraco.sdf
I actually ran strings on Umbraco.sdf file to get the credentials for admin. We will also need to verify the version used. Check Web.config file
Get the SHA-1 hash for admin and crack it using John or hashcat.
Now that we have credentials, we can try to exploit that (Authenticated) Remote Code Execution
Exploiting Umbraco's RCE (Authenticated)
This is the vulnerable page at http://10.10.10.180/umbraco/developer/Xslt/xsltVisualize.aspx
If the group "Authenticated users" has SERVICE_ALL_ACCESS in a service, then it can modify the binary that is being executed by the service. To modify it and execute nc you can do:
The exploit doesn't work without providing CLSID, we can get CLSID for UsoSvc service from here.
A CLSID is a globally unique identifier that identifies a COM class object. If your server or container allows linking to its embedded objects, you need to register a CLSID for each supported class of objects.