dms-pit.htb is served on port 80 and 9090 but here returns 403 Forbidden
SNMP
With public community string dumping a lot information was possible including nsExtendObjects that leaked user michelle and SELinux Roles as well as system version CentOs Linux release 8.3.2011
snmpwalk-v2c-cpublic10.10.10.2411# 1 at the end is to query all the records...[snip]...UCD-SNMP-MIB::prCount.1=INTEGER:3UCD-SNMP-MIB::prErrorFlag.1=INTEGER:noError(0)UCD-SNMP-MIB::prErrFix.1=INTEGER:noError(0)UCD-SNMP-MIB::prErrFixCmd.1=STRING:UCD-SNMP-MIB::dskIndex.1=INTEGER:1UCD-SNMP-MIB::dskIndex.2=INTEGER:2UCD-SNMP-MIB::dskPath.1=STRING:/UCD-SNMP-MIB::dskPath.2=STRING:/var/www/html/seeddms51x/seeddmsUCD-SNMP-MIB::dskDevice.1=STRING:/dev/mapper/cl-rootUCD-SNMP-MIB::dskDevice.2=STRING:/dev/mapper/cl-seeddmsUCD-SNMP-MIB::dskMinimum.1=INTEGER:10000UCD-SNMP-MIB::dskMinimum.2=INTEGER:100000UCD-SNMP-MIB::dskMinPercent.1=INTEGER:-1UCD-SNMP-MIB::dskMinPercent.2=INTEGER:-1UCD-SNMP-MIB::dskTotal.1=INTEGER:2611200UCD-SNMP-MIB::dskTotal.2=INTEGER:125600UCD-SNMP-MIB::dskAvail.1=INTEGER:350764UCD-SNMP-MIB::dskAvail.2=INTEGER:75496...[snip]...
Command returned interesting string /var/www/htmlseeddms51x/seeddms as this could indicate another web application running on the server.
SeedDMS
On port 80 SeedDMS was accessible on dms-pit.htb/seeddms51x/seeddms
SeedDMS
Login page
The obtained user michelle was using her name as a password that allowed to login to SeedDMS
Version
Upgrade note from administrator says that version was upgraded to 5.1.15
Users
Insider Docs/Users directory was listed one additional user Jack
Code Execution
User can add any file to the server and access it by going to the /seeddms51x/data/1048576/31/1.php url where data, 1048576 and 1.php are hardcoded values and 31 is DocumentID and this can be obtained from the URL