PORT STATE SERVICE REASON VERSION
21/tcp closed ftp reset ttl 63
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.41 ((Ubuntu))
|_http-favicon: Unknown favicon MD5: A0F0E5D852F0E3783AF700B6EE9D00DA
|_http-generator: Blunder
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Blunder | A blunder of interesting facts
let's check the website (apache2 running on port 80)
image
apparently is a site about interesting facts
looking at the page source code we will have :
image
and this caught my attention :
we know the version is 3.9.2, but we need to find out which is the CMS
making a fuzzing we found some files with the name "bl-kernel"
searching over this structure I found :
image
ok, the site is made in bludit 3.9.2
image
we can try to use an exploit from CVE-2019-16113, and get a RCE (Remote Code Execution)
BUT
this exploit needs the user and password, which we do not know