Blurry

Recon

nmap_scan.log
└─$ grep blur /etc/hosts
10.10.11.19     blurry.htb      app.blurry.htb  api.blurry.htb

HTTP (80)

Writeup.png

Username used Test02

Writeup-1.png

Googling for clearml vuln gives CVE: ClearML-vulnerability-exploit-RCE-2024-CVE-2024-24590-arrow-up-right

Create credentials

Writeup-2.png

CVE-2024-24590-ClearML-RCE-Exploitarrow-up-right

Reverse Shell (jippity)

Run exploit. For project name I tried test, then Black Swan (already created) and after few exploits I finally caught the shell

User.txt

Privilege Escalation (root)

evaluate_model is just a bash script that handles python script:

pth extension is PyTorch's extension for models which uses Pickle to load/dump data.

Writeup-3.png

Example taken from PyTorch torch.nn.Modulearrow-up-right

I changed cmd to reverse shell because the model kept hanging on me and not creating the backdoor. Catch the shell and pwn.

Root.txt

Last updated