Machine Info
Spoiler
This lab demonstrates exploiting a remote code execution vulnerability in SmarterMail build 6985 to gain SYSTEM-level access on a Windows server. Learners will identify the application version, leverage an RCE exploit, and use a reverse shell payload to compromise the target. This lab emphasizes web application exploitation and highlights the risks of unpatched software.
Administrator
Reconnaissance
We are going to start by running our nmap scan:
| |
From the services listed ports 9998, 7680 and 17001 seems uncommon. Looking at the web we come across SmarterMail.
Web - SmarterMail
─$ ffuf -u http://$VICTIM:9998/FUZZ -w /usr/share/seclists/Discovery/Web-Content/big.txt -r
/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v2.1.0-dev
________________________________________________
:: Method : GET
:: URL : http://$VICTIM:9998/FUZZ
:: Wordlist : FUZZ: /usr/share/seclists/Discovery/Web-Content/big.txt
:: Follow redirects : true
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200-299,301,302,307,401,403,405,500
________________________________________________
Download [Status: 500, Size: 36, Words: 4, Lines: 1, Duration: 321ms]
Scripts [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 87ms]
Services [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 84ms]
api [Status: 200, Size: 5199, Words: 261, Lines: 78, Duration: 90ms]
aux [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 95ms]
com1 [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 82ms]
com2 [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 85ms]
com4 [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 86ms]
com3 [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 87ms]
con [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 91ms]
download [Status: 500, Size: 36, Words: 4, Lines: 1, Duration: 88ms]
favicon.ico [Status: 200, Size: 32038, Words: 13, Lines: 13, Duration: 33ms]
fonts [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 95ms]
interface [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 84ms]
lpt1 [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 85ms]
lpt2 [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 86ms]
nul [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 96ms]
prn [Status: 200, Size: 4845, Words: 140, Lines: 82, Duration: 95ms]
reports [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 331ms]
scripts [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 78ms]
services [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 90ms]
views [Status: 200, Size: 0, Words: 1, Lines: 1, Duration: 99ms]
Not much from the fuzzing, looking it up online we find possible exploits but we are not sure for the version yet, but looking at details for port 17001 it hints us about CVE-2019-7214.
Tip
We are going to use the above exploit but first we need to add the correct IPs for the remote host and the local host so we can get the reverse shell.
Using the exploit we are able to achieve RCE and get access to SYSTEM.
| |
| |
