Surveillance

Recon

nmap_scan.log

HTTP (80)

Writeup.png

CraftCMS_CVE-2023-41892arrow-up-righthttps://blog.calif.io/p/craftcms-rcearrow-up-rightExploiting Arbitrary Object Instantiations in PHP without Custom Classesarrow-up-right

Upgrade the webshell to reverse shell:

Enumerate the database

There's 3 users on the box

Hmm.. the password is probably not crackable so giving up on that.

There's a SQL backup in application

Download the file with pwncat

Writeup-1.png

SSH (22)

Creds: matthew:starcraft122490

User.txt

Privilege Escalation (zoneminder)

No luck with sudo

There are other web applications

Port forward the application

Writeup-2.png

Default credentials admin:admin doesn't work, SSH credentials doesn't work, but admin:starcraft122490 works!

Creds: admin:starcraft122490

Writeup-3.png

The version is v1.36.32

CVE-2023-26035arrow-up-right

Privilege Escalation (root)

Looks like this user has permissions to sudo any binary above without password, but rule looks tricky so we might do more.

Application allows setting LD_PRELOAD environment variable

Writeup-4.png

For some reason pwncat-cs wasn't working when running gcc because ld is missing... (???) upgrade to SSH

LD_PRELOAD exists only in zmdc

version doesn't trigger it, but startup did.

Root.txt

Last updated