Inject

Recon

nmap_scan.log

HTTP (8080)

Writeup.png

2 users from /blog. admin and Brandon Auger, but none of the posts are readable.

Writeup-1.png

http://10.129.228.213:8080/uploadarrow-up-right accepts only images, upload one valid one. Get redirected to http://10.129.228.213:8080/show_image?img=kraken.pngarrow-up-right

LFI is possible

Writeup-2.png

The vulnerability oddly enough also supports directory listing so you can navigate the filesystem.

We can also enumerate users and this WebApp seems to be running as frank because we have read permissions.

Password doesn't work on SSH.

CVE-2022-22965arrow-up-right: Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5 -- Doesn't work.

CVE-2022-22963-PoCarrow-up-right -- works

Writeup-3.png

Password authentication didn't work on SSH, but it works locally, meaning SSH has password disabled.

SSH

Upgrade to SSH

Still doesn't work, check SSH configuration:

Only phil user is denied access... We can SSH as frank and then elevate then.

User.txt

Privilege Escalation

There's some ansible cronjob which probably runs these playbooks and then removes them.

https://exploit-notes.hdks.org/exploit/linux/privilege-escalation/ansible-playbook-privilege-escalation/arrow-up-right

After ~10 seconds

Root.txt

Last updated