└─$ nmap -sC -sV 10.10.11.47 Starting Nmap 7.94 ( https://nmap.org ) at 2024-12-11 10:08 CST Nmap scan report for linkvortex.htb (10.10.11.47) Host is up (0.16s latency). Not shown: 997 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 3e:f8:b9:68:c8:eb:57:0f:cb:0b:47:b9:86:50:83:eb (ECDSA) |_ 256 a2:ea:6e:e1:b6:d7:e7:c5:86:69:ce:ba:05:9e:38:13 (ED25519) 53/tcp open domain? | fingerprint-strings: | DNSVersionBindReqTCP: | version | bind | root-servers | nstld |_ verisign-grs 80/tcp open http Apache httpd |_http-generator: Ghost 5.58 |_http-title: BitByBit Hardware | http-robots.txt: 4 disallowed entries |_/ghost/ /p/ /email/ /r/ |_http-server-header: Apache 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port53-TCP:V=7.94%I=7%D=12/11%Time=6758F426%P=x86_64-pc-linux-gnu%r(DNS SF:VersionBindReqTCP,6B,"\0i\0\x06\x85\x03\0\x01\0\0\0\x01\0\0\x07version\ SF:x04bind\0\0\x10\0\x03\0\0\x06\0\x01\0\0\x01G\0@\x01a\x0croot-servers\x0 SF:3net\0\x05nstld\x0cverisign-grs\x03com\0x\xa5\xa2\xa9\0\0\x07\x08\0\0\x SF:03\x84\0\t:\x80\0\x01Q\x80")%r(DNSStatusRequestTCP,E,"\0\x0c\0\0\x90\x0 SF:2\0\0\0\0\0\0\0\0"); Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 117.97 seconds
Affected versions of this package are vulnerable to Arbitrary File Read which allows authenticated users to upload files that are symlinks. This can be exploited to perform an arbitrary file read of any file on the host operating system.
Note: Site administrators can check for exploitation of this issue by looking for unknown symlinks within Ghost's content/ folder.
bob@linkvortex:~$ sudo -l Matching Defaults entries for bob on linkvortex: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin, use_pty, env_keep+=CHECK_CONTENT
User bob may run the following commands on linkvortex: (ALL) NOPASSWD: /usr/bin/bash /opt/ghost/clean_symlink.sh *.png