Unified
Last updated
Was this helpful?
Last updated
Was this helpful?
Part of Starting Point's Tier 2 boxes, revolves around exploiting the Log4j vulnerability. Securing the initial foothold entails identifying the application's version through meticulous enumeration of the web server. Subsequently, leveraging a readily available allows us to gain access to the application using the administrator
account. Further reconnaissance within the site exposes plaintext SSH credentials, allowing us to root the box.
1
Web server enumeration
Browser
Web app's version
2
Researching
Browser
Log4j vulnerability &
3
Using
Foothold
4
Updating admin's password
Web application credentials
5
Web server enumeration
Browser
Privilege escalation
As always, let's start with a port scan. For efficiency, we will run a fast (-T5 --min-rate 10000
) all-ports (-p-
) scan first to find out which of them are open (-open
), and then we will do a version scanning (-sV
) as well as use Nmap's default scripts (-sC
) against open ports only.
Based on Nmap's output, we can note some things down:
There is an SSH port open (22
) which might represent the way to access the box.
There is an HTTP port (8080
) which redirects to https://10.129.158.126:8443/manage
which seems interesting.
By visiting the redirected URL we found above, we land on the UniFi login page which also include its version: 6.4.54
(Figure 1).
Before searching for the flag, we can first upgrade our shell (Figure 4).
We can now read the user.txt
flag within the home directory of the sole user of the box.
By enumerating the UniFi portal, we can find the root
's plaintext password (Figure 8) which we can use right away and read the root.txt
flag 🚩 (Figure 9).
The port 6789
seems to be used for an application called .
The last port (8880
) is related with a protocol called and it's also related with the .
Since we know the application's version, we can check if any known vulnerability exists. Doing that, reveals the (Figure 2.1) as well as a with a (Figure 2.2).
The includes both an and a route, but let's first try the PoC as it involves less steps. By opening a listener (Figure 3.1) and following the PoC's execution instructions (Figure 3.2), we indeed achieve and secure our foothold (Figure 3.3).
Check more about shell upgrades .
The of the article refers to a mongodb from which we can dump password hashes from. Let's check if we can do that (Figure 5).
Next, according to the , we can encrypt a new password (Figure 6.1) and use it to change the administrator
's password (Figure 6.2), so we can then use it to log in into the UniFi portal as a privileged user (Figure 7).
UniFi 6.4.54
.script
.administrator
's password.administrator
.root
's SSH password.