17445
Last updated
Last updated
Seems to be a ticket service.
Registering and creating a new user and logging in as issue_user : ManagementInsideOld797
Now checking the parameter in the code: It is vulnerable for SQL injection
Now we can write the webshell to the path discovered from port [[30455]]
Setup a listener:
Then:
We can head to that url:
Interrupting the page in burpsuite: We can change add the priority parameter: We have a 400 bad request error.
But trying with POST request: It's successful.
Now navigating to http://192.168.155.147:30455/webshell.php?cmd=id
To get a reverse shell: Start a python server:
We get a shell: