Introduction
Today I will go through the easy level HTB machine 🙂
Nmap
As usual two ports are open 22 & 80 .
Add pilgrimage.htb to /etc/hosts .
Enumeration
Git-Dumper
While using dirb I found .git directory which is forbidden, so I thought to use git-dumper to analyze the source code.
Here is the link for the git-dumper tool : https://github.com/arthaud/git-dumper
This is dump all the .git repository from the website 🙂
While analyzing the files I found two interesting things
Location of DB ????
and magick version
Web
There is a simple web interface with file upload, login and register …..
After analyzing I found that there is CVE related to majick version .
https://github.com/kljunowsky/CVE-2022-44268
Foothold
Clone this repo and run this exploit
python3 CVE-2022-44268.py --image imagetopoison.png --file-to-read /etc/passwd --output poisoned.png
And it worked perfectly fine.
Now upload the poisoned image.
Image uploaded successfully. Now copy the uploaded image url
Finally it worked. Now we have to read /var/db/pilgrimage that we found in our source code.
We have to make changes in script .
You will get this type of output
Just put it in a file .
After that
cat dump.sql| xxd -r -p - > sqlite.dump
Now analyze it with sqlite3 cmdline
You will get ssh pass for emily.
User
Advertisement
SSH Pass
emily:abigchonkyboi123
Root
After running pspy I found
After analyzing the .sh script I checked the binwalk version
And it was vulnerable to CVE-2022-4510
https://www.exploit-db.com/exploits/51249
After this you will get binwalk_exploit.png ………. copy it to /var/www/pilgrimage.htb/shrunk dir
And don’t forget to start a listener 🙂
And Boom you will get the shell as root .
This was very easy machine.
Hope you enjoyed the writeup.
Conclusion
Overall this is a good machine . I would like to rate 5/10 compared to easy level.
Jai Shree Krishna ❤️