Shoppy
Personal Rating: Easy
Last updated
Personal Rating: Easy
Last updated
There is a login page at
Trying default creds didnt work
Trying a simple SQLi the Server give a 504, which is interesting
I tried fuzzing for more parameters at but couldnt find more
I ran a rather aggressive sqlmap scan with no results
In the end there was a simple injection to be found at the login page:
I started a bruteforce for other users here just in case
That was worth it as I found the user josh with 6ebcea65320589ca4f2f1ce039975995. I could have used the payload from before to get all users, which I noticed later
I enumerated for any subdomains or other vhosts:
I actually found mattermost.shoppy.htb
After bruteforcing the hash of josh I could log in there with josh:remembermethisway
There was an interesting text channel
In one of the channels I found working ssh creds jaeger:Sh0ppyBest@pp!
Docker should be used for the deploy machine these credentials are for
I could ssh onto the machine with the creds of jaeger
There are the users with console jaeger, mattermost, postgres and deploy
According to LinPeas the machine is vulnerable to CVE-2022-0847, which is a priv esc exploit
sudo -u deploy /home/deploy/password-manager
works, so I might get the creds for the deploy user
There were some interesting files:
The last of which contained the mongodb creds DJ7aAdnkCZs9DZWx
I connected to the local mongodb that I found in the index js:
I did not find the admin hash decrypt, but I changed the hash, so the password for admin is also “remembermethisway”:
I found the url and under /exports/export-search.json there were credentials: