Sightless

Recon

nmap_scan.log|h-50%_styled
└─$ grep sight /etc/hosts
10.129.162.59   sightless.htb

HTTP (80)

In the listed services one of the link leads to sqlpad subdomain. Updated hosts.

Writeup.png

SQLPad

Writeup-1.png

SQLPad version is 6.10.0

Writeup-2.png

CVE-2022-0944

https://app.opencve.io/cve/?&vendor=sqlpad&product=sqlpadarrow-up-righthttps://app.opencve.io/cve/CVE-2022-0944arrow-up-righthttps://github.com/sqlpad/sqlpad/commit/3f92be386c6cd3e5eba75d85f0700d3ef54daf73arrow-up-righthttps://huntr.com/bounties/46630727-d923-4444-a421-537ecd63e7fbarrow-up-right

Writeup-3.png

As always fucking curl doesn't work, but wget works. spawn the shell.

Reverse Shell

Rev

Payload

SQLPad Database

Writeup-4.png

Michael

Nothing in the home directory, but we can try to crack the password.

root hash password is insaneclownposse

Creds: root:insaneclownposse Creds: michael:blindside

SSH

Creds: michael:insaneclownposse

User.txt

Privilege Escalation

Froxlor

Writeup-5.png

Updating host with admin subdomain goes redirects to the main domain. Start ssh session, but with port forwarding. (Update localhost to point to admin subdomain, otherwise it fails)

Writeup-6.png

The chrome debugger is known to be vulnerable.

Port forward both ports.

https://exploit-notes.hdks.org/exploit/linux/privilege-escalation/chrome-remote-debugger-pentesting/arrow-up-right

Visit chrome://inspect/#devicesarrow-up-right

The ps showed that 36347 port was used, but chrome didn't discover anything. Port forward all high ports.

localhost:34233 worked.

Writeup-7.png

The process logs every 5 second or so, we can observe the Network traffic and grab username/password.

Writeup-8.png

Creds: admin:ForlorfroxAdmin

Admin Panel

Writeup-9.png

I have been browsing for some time and it seems like from admin I went to web1

Writeup-10.png

Traffic > Customers > Table > web1 --> We become web1

As web1 we can change password on FTP without previous one.

Writeup-11.png

FTP

ftp command fails because of SSL, use lftp

KeePass

https://keepassxc.orgarrow-up-right

Writeup-12.png
Writeup-13.png
Writeup-14.png

Root

Creds: root:q6gnLTB74L132TMdFCpK

ssh didn't like the downloaded key and kept giving crypto errors. Solution: https://unix.stackexchange.com/a/734936arrow-up-right

Root.txt


Unintended steps (?)

that is the LFI code, you have to use suppress_origin=True in the ws connection and you can do some LFIhttps://gist.github.com/pich4ya/5e7d3d172bb4c03360112fd270045e05arrow-up-right

and

and

sarperavci > Disclosing Froxlor V2.x Authenticated RCE as Root Vulnerability via PHP-FPMarrow-up-right ??

Last updated