Hack The Box: GreenHorn
Initial Recon
NMAP
The service on port 3000 seems interesting.
Web Port - 80
Clicking on admin
at the bottom takes you to a login page that indicates the system is running pluc 4.7.18.
Which is vulnerable to an RCE.
I need a password for that though.
The homepage has a file
parameter...trying directory traversal fails and it says "hacking has been detected".
robots.txt
shows data
and docs
directories. Data redirects and docs is 403 forbidden.
Web Port - 3000
This is a GitTea instance, which likely means some code to find. There is one repo that appears to be the Pluck repo for the main web page.
In the path GreenHorn/data/settings/pass.php there is a password hash. A Google search quickly reveals this as "iloveyou1". Going back to the main page, we see that this successfully authenticates us.
Initial Access
With authenticated access to the Pluck service, now we can try out the RCE exploit linked above. Updating the credentials in the POC file, the exploit is successful despite the error that is returned.
We are in as www-data
so more escalation is needed.
Internal Recon
Ole reliable, LinPEAS:
junior
's home directory is world readable- Cannot read user.txt
- A PDF for using OpenVAS
- MariaDB running internally - 3306
/usr/local/bin/gitea
is writable- Interesting directories or files
- /usr/bin/rescan-scsi-bus.sh
- /usr/bin/gettext.sh
- /data
- /usr/share/byobu/desktop/byobu.desktop.old
- /usr/share/info/dir.old
None of these panned out, then I decided to just try the main page password on the junior
user and this was successful.
To maintain persistent access, I upload my SSH public key for Junior.
Escalation
Now with junior
access, I can get and read that OpenVAS file. It has a password for accessing OpenVAS but it is blurred out. Now an a long journey to figure out how to deobfuscate that. After too much time trying to figure this out, this was the final process.
Install poppler-utils
to get the pdfimages
utility for extracting images from a PDF.
sudo apt-get update
sudo apt-get install poppler-utils
pdfimages -all "Using OpenVAS.pdf" ./
The output adds a -
to the file name which was not playing nice in the terminal so I renamed it without the dash via the Files GUI. Next, with the image extracted was to attempt to depixelate it. Trying the image with each of the sample images included with the repo, I had success with this command.
Now we can see the password. Immediately trying this to escalate to root, was successful.
SSH in and grab the flag!