Port Enumeration

I found just one port working, por 80. image5.png With ffuf I found the subdomain internal-administration.

Web Enumeration

After a short enumeration, I found a los panel. image27.png After failing the log, I can see an error 500. image10.png With another test, I found who this panel is vulnerable to SQLI. image15.png

SQL Injection

Using an ORDER query I confirm who the query needs 4 columns. image22.png Knowing this, I used a UNION query to extract all the tables. image19.png I found just 1 table, test, so, I extracted the columns. image24.png And, with this info, I extracted the table content. image21.png I found a hash, and I used john to crack it.

Hash cracking

john --formad=raw-md5 --wordlist=/usr/share/wordlists/rockyou.txt

image23.png With this password I was able to access the admin panel in the subdomain internal-administration. image12.png image9.png In this panel, I found a SSTI in the profile panel. image30.png

SSTI

Using SSTI, I am able to exploit RCE. image1.png With this, I was able to exploit a Reverse Shell. image8.png image17.png

Docker escape

Here, I found that the host user home is mounted in the docker. image11.png image20.png This means who the user in the docker is the same in the host machine, so, using ssh, and the password I obtained in the SQLI, I connect to the host machine. image28.png

Privilege escalation

The docker have a mounted volume who i can control, so, I just copied the bash binary in this directory. image26.png And now, inside the docker, I actived the SUID. image29.png image18.png Now, In the host machine, I have a root bash binary with SUID active, with means, a root shell. image14.png image4.png