Editorial

Recon

nmap_scan.log
└─$ grep 'edit' /etc/hosts
10.10.11.20     editorial.htb

HTTP (80)

It about page we have another subdomain Contact us: submissions@tiempoarriba.htb, but it leads to same domain.

Writeup.png

There's also upload

Writeup-1.png

The cover image is not in form body, Priview button displays the image and it also creates it if uploaded.

Writeup-2.png

The server also makes request to us, which indicates possible LFI/RFI or SSRF.

SSRF

For easy box probably no port will be open above 10000 (or near to that value) so I stopped.

Script is more like plug and play rather then interactive.

URL: url = 'http://0:5000/api/latest/metadata/changelog'

Leaked Credentials

URL: url = 'http://0:5000/api/latest/metadata/messages/authors'

Creds: dev:dev080217_devAPI!@

SSH

User.txt

Privilege Escalation (prod)

Totally unintentional usage of http://0 for localhost, because its short and I'm lazy, lol. But looks like there was localhost blacklist!

Nothing in the app in current state, check commits:

Prod is interesting, check what changed:

prod is another user on system:

Creds: prod:080217_Producti0n_2023!@

Privilege Escalation (root)

The script is vulnerable to CVE-2022-24439arrow-up-right Remote Code Execution (RCE)arrow-up-right

We get an error, but the command was executed.

Note: The exploit requires percentages after each "word" ends.

Last updated