Interface

Recon

chevron-rightnmap_scan.loghashtag
Open 10.129.228.208:22
Open 10.129.228.208:80
[~] Starting Script(s)
[>] Running script "nmap -vvv -p {{port}} {{ip}} -vvv -sV -sC -Pn" on ip 10.129.228.208

PORT   STATE SERVICE REASON  VERSION
22/tcp open  ssh     syn-ack OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 72:89:a0:95:7e:ce:ae:a8:59:6b:2d:2d:bc:90:b5:5a (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDsUhYQQaT6D7Isd510Mjs3HcpUf64NWRgfkCDtCcPC3KjgNKdOByzhdgpqKftmogBoGPHDlfDboK5hTEm/6mqhbNQDhOiX1Y++AXwcgLAOpjfSExhKQSyKZVveZCl/JjB/th0YA12XJXECXl5GbNFtxDW6DnueLP5l0gWzFxJdtj7C57yai6MpHieKm564NOhsAqYqcxX8O54E9xUBW4u9n2vSM6ZnMutQiNSkfanyV0Pdo+yRWBY9TpfYHvt5A3qfcNbF3tMdQ6wddCPi98g+mEBdIbn1wQOvL0POpZ4DVg0asibwRAGo1NiUX3+dJDJbThkO7TeLyROvX/kostPH
|   256 01:84:8c:66:d3:4e:c4:b1:61:1f:2d:4d:38:9c:42:c3 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGrQxMOFdtvAa9AGgwirSYniXm7NpzZbgIKhzgCOM1qwqK8QFkN6tZuQsCsRSzZ59+3l+Ycx5lTn11fbqLFqoqM=
|   256 cc:62:90:55:60:a6:58:62:9e:6b:80:10:5c:79:9b:55 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPtZ4bP4/4TJNGMNMmXWqt2dLijhttMoaeiJYJRJ4Kqy
80/tcp open  http    syn-ack nginx 1.14.0 (Ubuntu)
| http-methods: 
|_  Supported Methods: GET HEAD
|_http-favicon: Unknown favicon MD5: 21B739D43FCB9BBB83D8541FE4FE88FA
|_http-title: Site Maintenance
|_http-server-header: nginx/1.14.0 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

HTTP (80)

Writeup.png

Update DNS.

API

In the headers we get some interesting information.

Writeup-1.png

Dirbusting

Fuzzing for filename in GET and POST request yielded no success. Then I tried to enumerate the directories. /vendor exists, but denied.

Not sure why, but feroxbuster didn't recurse on this endpoint.

403 everywhere 🤔

Because it's an API it's possible that 404 is returned as response which feroxbuster by default filters.

More fuzzing

Parameter Fuzzing

Because we are working with NextJS app it's liking JSON more then urlencoded data.

It works as expected.

Writeup-2.png

DomPDF

Dompdf 1.2.1 - Remote Code Execution (RCE)arrow-up-rightCVE-2022-28368arrow-up-right -> From XSS to RCE (dompdf 0day)arrow-up-right -> dompdf-rcearrow-up-right

PoC is working

Writeup-3.png

Reverse Shell

Note: as per post the url is /vendor/library/library/lib/fonts/*.php, like:

Writeup-4.png

Privilege Escalation

Cronjob

In Executable files potentially added by user section linpeas showed a cleanup script of some sort.

bash test injection vulnerability with -varrow-up-right

For some odd reasons directly executing the command inside $(...) or `...` didn't work. If we include the script inside it then works?!?!?

Flags

Last updated