<- HTB

Shared


11 minutes to read

Shared
Hack The Box. Linux. Medium machine. This machine has an e-commerce store that is vulnerable to SQLi. With this vulnerability we can get a hashed password which is reused for SSH. There is another user that runs ipython periodically, so we can inject a configuration file to execute commands. The second user is able to use a binary compiled in Go that connects to Redis. A binary analysis reveals the password, so we can connect to Redis and exploit a CVE to run Lua code, escape from the sandbox and execute system commands as root