Agile

Recon

nmap_scan.log

HTTP (80)

Writeup.png

During registration I used username as password and app crashed... But looks like Flask Debug is on.

Writeup-1.png

Once we are logged in we can add credentials and export them

Writeup-2.png

But you need to click Save Icon to actually save the record, otherwise it's gone and Export will complain.

After that it's making request to download, which could be vulnerable to LFI

Writeup-3.png

LFI

LFI confirmed

Writeup-4.png

When file is not found app crashes and debug mode shows full path for application

Nothing we can further exploit so let's move on to Flask Debug and leak Pin

There's no /console because in app.wsgi_app = DebuggedApplication(app.wsgi_app, True) evalex=True is not specified.

https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/werkzeugarrow-up-right

Writeup-5.png

SSH (22)

The passwords database contains passwords in plaintext

User.txt

Privilege Escalation

There's second application running on 5555 as runner, but it's test version of superpass.

Port forward

There's interactive test running by Selenium using Google Chrome

https://exploit-notes.hdks.org/exploit/linux/privilege-escalation/chrome-remote-debugger-pentesting/arrow-up-right

Writeup-6.png
Writeup-7.png
Site
Username
Password

agile

edwards

d07867c6267dcb5df0af

twitter

dedwards__

7dbfe676b6b564ce5718

SSH (edwards)

Privilege Escalation

sudo 1.8.0 to 1.9.12p1 - Privilege Escalationarrow-up-right

Doesn't work. Let's find what dev_admin can access

Let's edit the activate script

Last updated