Vulnerability Explanation: The machine is misconfigured on set the default credential which could allow us to login and deploy reverse shell payload and gain access on the machine.
Privilege Escalation Vulnerability: N/A
Vulnerability Fix: Be aware of Default Credentials and Least privilege User.
Severity: Critical
Step to Compromise the Host:
Reconnaissance
└─$ nmap -p- -sC -sV -T4 10.10.10.95 -Pn
Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.
Starting Nmap 7.91 ( https://nmap.org ) at 2021-11-21 05:19 EST
Stats: 0:00:53 elapsed; 0 hosts completed (1 up), 1 undergoing Connect Scan
Nmap scan report for 10.10.10.95
Host is up (0.042s latency).
Not shown: 65534 filtered ports
PORT STATE SERVICE VERSION
8080/tcp open http Apache Tomcat/Coyote JSP engine 1.1
|_http-favicon: Apache Tomcat
|_http-server-header: Apache-Coyote/1.1
|_http-title: Apache Tomcat/7.0.88
Enumeration
Port 8080 Apache-Coyote/1.1
by going through port 8080, we see a Tomcat webpage.