Web Services

PORT     STATE SERVICE REASON         VERSION
8091/tcp open  http    syn-ack ttl 63 lighttpd 1.4.53
| http-method-tamper: 
|   VULNERABLE:
|   Authentication bypass by HTTP verb tampering
|     State: VULNERABLE (Exploitable)
|       This web server contains password protected resources vulnerable to authentication bypass
|       vulnerabilities via HTTP verb tampering. This is often found in web servers that only limit access to the
|        common HTTP methods and in misconfigured .htaccess files.
|              
|     Extra information:
|       
|   URIs suspected to be vulnerable to HTTP verb tampering:
|     / [POST]
|   
|     References:
|       http://www.imperva.com/resources/glossary/http_verb_tampering.html
|       http://capec.mitre.org/data/definitions/274.html
|       https://www.owasp.org/index.php/Testing_for_HTTP_Methods_and_XST_%28OWASP-CM-008%29
|_      http://www.mkit.com.ar/labs/htexploit/
| http-security-headers: 
|   Cache_Control: 
|     Header: Cache-Control: no-store, no-cache, must-revalidate
|   Pragma: 
|     Header: Pragma: no-cache
|   Expires: 
|_    Header: Expires: Thu, 19 Nov 1981 08:52:00 GMT
| http-sitemap-generator: 
|   Directory structure:
|   Longest directory structure:
|     Depth: 0
|     Dir: /
|   Total files found (by extension):
|_    
|_http-date: Sat, 06 Aug 2022 19:01:43 GMT; 0s from local time.
|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
|_http-feed: Couldn't find any feeds.
| http-auth-finder: 
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.135.97
|   url                          method
|_  http://192.168.135.97:8091/  HTTP: Basic
|_http-referer-checker: Couldn't find any cross-domain scripts.
|_http-csrf: Couldn't find any CSRF vulnerabilities.
| http-useragent-tester: 
|   Status for browser useragent: 401
|   Allowed User Agents: 
|     Mozilla/5.0 (compatible; Nmap Scripting Engine; https://nmap.org/book/nse.html)
|     libwww
|     lwp-trivial
|     libcurl-agent/1.0
|     PHP/
|     Python-urllib/2.5
|     GT::WWW
|     Snoopy
|     MFC_Tear_Sample
|     HTTP::Lite
|     PHPCrawl
|     URI::Fetch
|     Zend_Http_Client
|     http client
|     PECL::HTTP
|     Wget/1.13.4 (linux-gnu)
|_    WWW-Mechanize/1.34
|_http-comments-displayer: Couldn't find any comments.
|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
|_http-jsonp-detection: Couldn't find any JSONP endpoints.
|_http-server-header: lighttpd/1.4.53
|_http-chrono: Request times for /; avg: 209.19ms; min: 203.12ms; max: 216.64ms
| http-errors: 
| Spidering limited to: maxpagecount=40; withinhost=192.168.135.97
|   Found the following error pages: 
|   
|   Error Code: 401
|_  	http://192.168.135.97:8091/
|_http-fetch: Please enter the complete path of the directory to save data in.
|_http-mobileversion-checker: No mobile version detected.
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
| http-vhosts: 
|_128 names had status 401
|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
|_http-favicon: Unknown favicon MD5: B5F9F8F2263315029AD7A81420E6CC2D
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-config-backup: ERROR: Script execution failed (use -d to debug)
|_http-litespeed-sourcecode-download: Request with null byte did not work. This web server might not be vulnerable
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-iis-webdav-vuln: Could not determine vulnerability, since root folder is password protected
|_http-dombased-xss: Couldn't find any DOM based XSS.
|_http-malware-host: Host appears to be clean
| http-headers: 
|   Set-Cookie: PHPSESSID=h4a5fnr8pjoqnv8b42eoos5p63; path=/
|   Expires: Thu, 19 Nov 1981 08:52:00 GMT
|   Cache-Control: no-store, no-cache, must-revalidate
|   Pragma: no-cache
|   WWW-Authenticate: Basic realm="RaspAP"
|   Content-type: text/html; charset=UTF-8
|   Content-Length: 15
|   Connection: close
|   Date: Sat, 06 Aug 2022 19:01:51 GMT
|   Server: lighttpd/1.4.53
|   
|_  (Request type: GET)
|_http-devframework: ASP.NET detected. Found related header.
| http-auth: 
| HTTP/1.1 401 Unauthorized\x0D
|_  Basic realm=RaspAP
| http-cookie-flags: 
|   /: 
|     PHPSESSID: 
----------------------------------------------------------------------------------- ---------------------------------
RaspAP 2.6.6 - Remote Code Execution (RCE) (Authenticated)                         | php/webapps/50224.py
----------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results
╭─      /home/kali ▓▒░───────────────────────────────────────────────────────────────────────░▒▓ ✔  root@kali 
╰─ searchsploit -x php/webapps/50224.py                    
  Exploit: RaspAP 2.6.6 - Remote Code Execution (RCE) (Authenticated)
      URL: https://www.exploit-db.com/exploits/50224
     Path: /usr/share/exploitdb/exploits/php/webapps/50224.py
File Type: Python script, ASCII text executable


Last updated