Included

Personal Rating: Easy

Enumeration

Running an initial nmap scan:

sudo nmap <IP>

80/tcp open  http 
68/udp open|filtered dhcpc 
69/udp open|filtered tftp

PHP Path Traversal

I quickly found an LFI approach

So the first user seems to be 'mike'.

Since we have the tftp user and the port 69 open, I searched for the tftp default folder, which is /var/lib/tftpboot.

I tried some command executions using php wrappers with the LFI, but that didn't work.

Initial Access

I found mike's credentials in the file '.htaccess'.

Through the LFI I also found out that the user is a member of the lxd group, which opens up this privilege escalation path:

But first I have to get a shell. I uploaded a webshell using the tftp share:

I fetched the shell an upgraded it to a fully interactive one:

LXD Group Abuse to root

I then used the tftp port to transfer an alpine linux container on to the host to exploit the lxd group.

Last updated