PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 63 OpenSSH 7.6p1 Ubuntu 4ubuntu0.6 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 02:5e:29:0e:a3:af:4e:72:9d:a4:fe:0d:cb:5d:83:07 (RSA)
| 256 41:e1:fe:03:a5:c7:97:c4:d5:16:77:f3:41:0c:e9:fb (ECDSA)
| 256 28:39:46:98:17:1e:46:1a:1e:a1:ab:3b:9a:57:70:48 (ED25519)
80/tcp open http syn-ack ttl 63 nginx 1.14.0 (Ubuntu)
|_http-favicon: Unknown favicon MD5: 1575FDF0E164C3DB0739CF05D9315BDF
|_http-title: Late - Best online image tools
| http-methods:
|_ Supported Methods: GET HEAD
|_http-server-header: nginx/1.14.0 (Ubuntu)
Mannual Analysis
• email → support@late.htb
• added images.late.htb and late.htb to /etc/hosts
• designed by “kavi.gihan”
• I used Whatweb to identify what services the web application is using and got :
root@Offsec:~/Desktop/machine# whatweb http://late.htb
http://late.htb [200 OK] Bootstrap[3.0.0], Country[RESERVED][ZZ], Email[#,support@late.htb], Google-API[ajax/libs/jquery/1.10.2/jquery.min.js], HTML5, HTTPServer[Ubuntu Linux][nginx/1.14.0 (Ubuntu)], IP[10.10.11.156], JQuery[1.10.2], Meta-Author[Sergey Pozhilov (GetTemplate.com)], Script, Title[Late - Best online image tools], nginx[1.14.0]
root@Offsec:~/Desktop/machine# whatweb http://images.late.htb
http://images.late.htb [200 OK] Bootstrap, Country[RESERVED][ZZ], HTML5, HTTPServer[Ubuntu Linux][nginx/1.14.0 (Ubuntu)], IP[10.10.11.156], JQuery[3.4.1], Script[text/javascript], Title[Image Reader], X-UA-Compatible[ie=edge], nginx[1.14.0]
I visited “images.late.htb”
It looks like we can upload images on the site ..
I uploaded a simple a simple image First and some malicious also but this is not that vulnerablity which I was thinking of.
I reaserched online and got that https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection this type of vulnerability call SSTI (Server Side Template Injection) /
from Here I used the this screenshot to upload to the server .
and boom!! magic we got our maths calculated .
And after turning off the intercept from burp and moving to the webpage we will be awarded with a “results.txt” file.
which contains the same data which we get from repeater .
So, This is the time to move Forward with this attack .
to see if we can read the content of passwd file and we succeded.