Codify

Recon

nmap_scan.log

HTTP (80)

Simple webapp which seems to allow running arbitrary Javascript in a sandbox.

Writeup.png

From About page:The vm2arrow-up-right library is a widely used and trusted tool for sandboxing JavaScript. It adds an extra layer of security to prevent potentially harmful code from causing harm to your system. We take the security and reliability of our platform seriously, and we use vm2 to ensure a safe testing environment for your code.

CVE-2023-29017

Uncovering Potentially Exploitable vm2 Vulnerabilities: CVE-2023-29017arrow-up-right

ExploitDB: vm2 - sandbox escapearrow-up-right

Reverse Shell

We are svc service user. There's another application in /var/www which contains database:

Crack the password:

SSH

Creds: joshua:spongebob1

User.txt

Privilege Escalation

The first vulnerability in script I see is no quotes around variables in IF condition

This can be easily bypassed by wildcard *

To see what commands are being ran we can use pspy

Writeup-1.png

Root.txt

Last updated