TryHackMe – broker writeup

TryHackMe – broker writeup

I solved this challenge as follows:

nmap result:

Browsing to 10.10.81.90:8161 i found ActiveMQ:

Clicking “Manage ActiveMQ broker” and accessing with standard credentials admin:admin I was able to logging in.

I found that ActiveMQ is 5.9.0 version and that in “Topics” menu there is a “secret_chat”:

As seen before, the port 1883 is relative to mqtt, then i installed “mosquitto-clients” in my machine:

apt-get install mosquitto-clients

So, i was able to see secret_chat messages using this command:

mosquitto_sub -h 10.10.81.90 -t secret_chat

Now, exploring webapp and googling about related exploit, i found it:

https://medium.com/@knownsec404team/analysis-of-apache-activemq-remote-code-execution-vulnerability-cve-2016-3088-575f80924f30

Following this vulnerability i was able to gain a netcat shell.

First you need to use Burp to forward malicious packets.

These are the steps:

google to search a jsp “cmd” GET request to gain RCE (I googled “Jsp webshell”);

upload malicious Jsp script via CVE-2016–3088 first with PUT request then with MOVE request as follows:

    – forward malicious packets via Burp with the above Jsp script found on google with PUT request:

– then with MOVE request:

Now I got RCE (in this case running “ls” command):

Using netcat I got a reverse shell and read flag file:

For privilege escalation I ran “sudo -l” command and the results is:

you can run “subscribe.py” python file with root privileges. For me the easy way to get a root shell was replace “subscribe.py” file with my own malicious “subscribe.py” file, since the user I connected with can write to the /opt/apache-activemq-5.9.0/ folder.

The new malicious “subscribe.py” file I created is the following:

Now, for upload this file to a victim machine, considering that “wget” doesn’t work in victim, I ran python http.server in my kali and I used “curl” to download “subscribe.py” file on victim. But first of all I had to remove original “subscribe.py” file.

Finally I activated netcat listener on my pc and I ran sudo command in victim machine:

And I got root shell.

0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Dark Mode
0
Would love your thoughts, please comment.x
()
x
| Reply