June 14, 2025

Sau HackTheBox Write-Up

Article image

NMAP

alt

ENUMERATION

  • Nmap found a HTTP service running on port 55555, so we had a look at it through Fiirefox and we found a Requests Baskets v 1.2.1 alt
  • We’re gonna create a basket to access to the panel and have a better look at the application alt
  • We can make a request with curl to the speciofy url and it should appear on the panel alt
  • We also found that on the configuration settings we can forward the request to a specific url, so we’re gonna try to do it to the localhost alt
  • We then send a GET request using curl to the basket and we recevied html content, so we use html2text to have a look at the content and we found a service that seems to be running on port 80 and its version alt
  • As we can see this version os Request BAskets seems to be vulnerable to SSRF and we doing a bit of research online we could found a exploit alt
  • since we also foun the MAltrail version we could also find a RCE exploit for this version alt
  • The exploit only needs our IP and listener port and the URL where the service is being hosted which thanks to SSRF we can access to it, we start our listener in port 1337 and we gain access to the system alt

LOCAL

alt

PRIVILEGE ESCALATION

  • As the user puma we found that we have a sudoers permission and we can execute a command, when we try to run the command we enter in the scroll mode page where we can use the special character ! to escape and gain access as the user root alt

ROOT

alt

Share