Plant Photographer
I enumerated the website and found a Download Resume button on the homepage.

I viewed the source code of the website.

The Download Resume button was calling a
/downloadAPI endpoint to fetch the file. I could use this to carry out an SSRF attack on the target.I tried using a custom script hosted on my machine via SSRF but failed to do so. I tinkered around with the endpoint and triggered error messages to learn more about the infrastructure being used in the backend.
While I was conducting manual enumeration Gobuster was running a directory scan on the target. The following subdirectories were found.
The admin page gave the following error.

The console page was locked behind a PIN.

I viewed it's page source and found the following.

I didn't really understand it's significance here and whether it could be of any use to me but I still took note of it.
Next I kept working the
/downloadendpoint and triggered a pycurl error by modifying the port to an invalid value.

This revealed that the website was running Python's Flask framework in the backend. I looked through the errors and found the following

The API Key was left in the open and hence the first flag was obtained. This was easy.
The next objective was to gain access to the admin portal.
Last updated