$ nmap -p- --min-rate 4000 -Pn 192.168.201.204
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-08 15:54 +08
Nmap scan report for 192.168.201.204
Host is up (0.17s latency).
Not shown: 65533 filtered tcp ports (no-response)
PORT STATE SERVICE
80/tcp open http
3306/tcp open mysql
I did a detailed scan on these ports:
$ sudo nmap -p 80,3306 -sC -sV --min-rate 4000 192.168.201.204
[sudo] password for kali:
Starting Nmap 7.93 ( https://nmap.org ) at 2023-07-08 15:56 +08
Nmap scan report for 192.168.201.204
Host is up (0.18s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Slick - Bootstrap 4 Template
3306/tcp open mysql MySQL 5.5.5-10.3.34-MariaDB-0ubuntu0.20.04.1
| mysql-info:
| Protocol: 10
| Version: 5.5.5-10.3.34-MariaDB-0ubuntu0.20.04.1
| Thread ID: 37
| Capabilities flags: 63486
| Some Capabilities: IgnoreSigpipes, Speaks41ProtocolOld, SupportsTransactions, DontAllowDatabaseTableColumn, Support41Auth, LongColumnFlag, FoundRows, IgnoreSpaceBeforeParenthesis, ConnectWithDatabase, InteractiveClient, Speaks41ProtocolNew, SupportsLoadDataLocal, ODBCClient, SupportsCompression, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments
| Status: Autocommit
| Salt: E!sB/b!zhxE.VGAOJd;9
|_ Auth Plugin Name: mysql_native_password
Web Enumeration
Port 80 hosted a static page:
I ran a gobuster on this website, and it did find a few directories of interest:
/bugtracker looks interesting. It brought me to a login page stating that the admin directory is a security risk.
I tried to access the /admin panel but it didn't work. I took a look at the Github repository for this software and tried to access the other files within the admin panel, which worked:
At the bottom of the page, there are options to Upgrade the SQL database:
If we just click on the Install button without filling in any details, we are brought to another page:
There's a configuration file mentioned at the bottom of the page, and it also shows that the web page is able to interact with the SQL instance.
Rogue MySQL LFI -> MySQL Creds
I did a lot more reading about install.php and the other components related to SQL (because SQL is publicly facing for some reason) of the admin panel and came across this CVE:
Now, there are RCE exploits for this, but the one from searchsploit also abuses another exploit to do with password resetting for the administrator user.
First of all, that doesn't seem to work for this machine, and secondly, we already have the administrator password. In this case, I manually exploited the machine while using the PoC as a guideline.
We can first login as the administrator:
Then, head to /bugtracker/adm_config_report.php and create the following Configuration Options:
Then, just visit /bugtracker/workflow_graph_img.php, and we will receive a reverse shell:
Privilege Escalation
Pspy Mantis Creds -> Root
We can grab the user flag from the user mantis. Afterwards, we can find some interesting files within their home directory:
www-data@mantis:/home/mantis/db_backups$ ls -la
total 52
drwxr-xr-x 2 mantis mantis 4096 Jan 30 16:15 .
drwxr-xr-x 3 mantis mantis 4096 May 17 2022 ..
-rw-rw-r-- 1 mantis mantis 37130 Jul 8 08:44 1652766150.sql
-rwx------ 1 mantis mantis 104 May 17 2022 backup.sh
The file was recently edited, so I ran pspy64 on the machine to see what backup.sh was doing.