Temple of Doom

https://download.vulnhub.com/templeofdoom/temple-of-DOOM-v1.ova

靶场IP:192.168.32.10

扫描对外端口服务

┌──(root㉿kali)-[~]
└─# nmap -sV -p1-65535 192.168.32.10
Starting Nmap 7.92 ( https://nmap.org ) at 2022-09-06 23:25 EDT
Nmap scan report for 192.168.32.10
Host is up (0.00013s latency).
Not shown: 65533 closed tcp ports (reset)
PORT    STATE SERVICE VERSION
22/tcp  open  ssh     OpenSSH 7.7 (protocol 2.0)
666/tcp open  http    Node.js Express framework
MAC Address: 08:00:27:D1:C1:2D (Oracle VirtualBox virtual NIC)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 13.63 seconds

浏览器访问666端口

image-20220907112648441

再次刷新就会报错

image-20220907123835446

使用bp抓取数据包,分析,报错原因是CSRFtoken过期导致报错

image-20220907133703733

把CSRF相关字段删掉重新发送,会提示helle Admin

image-20220907133849418

根据nodejs反序列化漏洞,可以生成payload

https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/

image-20220907134931940

构造反弹shell

image-20220907135115408

查看/etc/passwd文件,找到ss-manager

找到exp:https://www.exploit-db.com/exploits/43006

image-20220907140028677

提权exp

可以建立连接

image-20220907140827841
image-20230208160741149

最后更新于

这有帮助吗?