Hawat
Summary
Target exposed 3 different web apps on ports 17445, 30455, and 50080.
Source code of the Issue Tracker (port 17445) revealed a SQL injection vulnerability in the
priority
parameter.Used SQLi to write a PHP web shell into the document root (discovered via
phpinfo.php
).Triggered the shell to gain initial access to the system.
Used
wget
to upload a reverse shell and executed it for full command execution.
🧵 Let's Unpack
Enumeration
Open ports: 22
, 17445
, 30455
, 50080
🔎 Web App (17445)
Found login/register pages.
Identified the use of Java + SQL backend from source code.
SQL Injection found in:
Credentials in source:
🔎 Web App (30455)
Exposed
phpinfo.php
.Revealed document root:
🔎 Web App (50080)
NextCloud instance hosted at
/cloud
.Default creds worked:
admin:admin
.
Initial Foothold
Wrote Web Shell using SQL Injection
Executed commands via shell
Uploaded reverse shell
Caught shell
✅ Shell access achieved!
Last updated
Was this helpful?