So we have port 8500 open running FTMP. I tried accessing the site but it is SUPER slow and takes like 2 minutes to load so I figured it wasnt a website but it is.
Accessing this page gives us the hash of the admin user. I followed this guide on coldfusion to find this.
https://nets.ec/Coldfusion_hacking
http://10.10.10.11:8500/CFIDE/administrator/enter.cfm?locale=..\..\..\..\..\..\..\..\ColdFusion8\lib\password.properties%00en
password=2F635F6D20E3FDE0C53075A84B68FB07DCEC9B03 encrypted=true
SHA1 hash cracks to happyday
We can now login to the admin portal
Following the same guide above it walks us through getting a shell(this is the intended way as this guide was posted in 2012 before the box was made)
First I downloaded a script from https://github.com/Impenetrable/ReverseFusion/blob/master/ReverseFusion.py to create a cfm reverse shell. Then we host a web server and put that as the URL so the target webserver will download our shell and upload it to /CFIDE/scripts. Once we save it we click the button next to the task to run it.
We need to go to the mappings tab on the left to get the directory where we want to download the file(make sure to add the file name to the end of the path ie, pwn.cfm). Once the script runs it will download it to that directory which should populate it into /CFIDE
C:\ColdFusion8\wwwroot\CFIDE
Web server downloads shell
We go to http://10.10.10.11:8500/CFIDE/pwn.cfm to trigger our shell
User flag
We run whoami /priv and we have Impersonate
We can use Juicy reflection in metasploit to priv esc to admin
We could have also used this exploit
exploit/windows/local/ms10_092_schelevator