Disclosure date:  08/17/19

    CVE-2019-15229

    FuelCMS 1.4.4 and possibly before are affected by a Cross Site Request Forgery vulnerability in the Create Blocks section of the Admin console.  This could lead to an attacker tricking the administrator into executing arbitrary code via a specially crafted HTML page.


    The description states:  "Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers."

    I wanted to like this and perhaps there's much to like but when I'm looking at these types of frameworks, I'm interested in how it can help me.  There's definitely a red team / blue team component to this and maybe that's where this excels but that's of little interest to me.  

    This is the first time I've run a dot net application on Linux so that was kind of cool  And in general, it's a cool tool but I don't see how it will aid me.  


    Disclosure date:  08/17/19

    CVE-2019-15228

    FuelCMS 1.4.4 and possibly before are affected by a Cross Site Scripting vulnerability in the Create Blocks section of the Admin console.  This could lead to cookie stealing and other malicious
    actions.  This vulnerability can be exploited with an authenticated account but can also impact unauthenticated visitors.


    Not to be the guy who says this is easy because everyone is somewhere on the ladder but this one is a pretty big softball. 

    The description states:  "This boot2root is a linux based virtual machine and has been tested using VMware workstation 14."  Works fine on VirtualBox which is what I used.

    This is part of a new batch of servers that were dumped overnight and I had a few minutes to spare.

    Kicking off with Nmap:


    Disclosure date:  08/16/19

    CVE-2019-15227

    Flightpath 4.8.3 and possibly before are affected by numerous Cross Site Script vulnerabilities in the "Content", "Edit urgent message", and "Users" section of the Admin Console.  This could lead to cookie stealing and other malicious actions.  This vulnerability can be exploited with an authenticated account but can also impact unauthenticated visitors.


    While perusing the Vulnub back catalog for boxes that I can suggest to a relatively new penetration tester, I came across the "hackfest" series which sounded familiar.  Searching this site, I realized I'd written up the Quaorar box.  This one, Sedna, is the next in the series which promises to be "medium" in difficulty while the Quaorar box is "very easy".  Quickly glancing at the previous write up and just finishing this one, I'd say they are both "easy" but that's just an opinion.  This one is definitely a good beginner box, in my opinion.

    We kick off with Nmap:


    © 2020 sevenlayers.com