OpenKeyS is an OpenBSD box that features CVE 2019-19521 as an vulnerability that allows you to gain access to user and ultimately root.
Enumeration
We start off with an NMAP scan we can see that there are two open ports. 22 for SSH and 80 for OpenBSD httpd.
Nmap scan report for 10.10.10.199
Host is up (0.079s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.1 (protocol 2.0)
| ssh-hostkey:
| 3072 5e:ff:81:e9:1f:9b:f8:9a:25:df:5d:82:1a:dd:7a:81 (RSA)
| 256 64:7a:5a:52:85:c5:6d:d5:4a:6b:a7:1a:9a:8a:b9:bb (ECDSA)
|_ 256 12:35:4b:6e:23:09:dc:ea:00:8c:72:20:c7:50:32:f3 (ED25519)
80/tcp open http OpenBSD httpd
|_http-title: Site doesn't have a title (text/html).
We decided to take a look at the web server first since we don’t have credentials and bruteforcing especially blind isn’t usually the path on HTB.
We open port 80 in a web browser and find by logging we will apparently be given ssh keys. That is very convenient.
However we don’t have credentials and as mentioned before, it is unlikely that we would need to bruteforce this. There is likely something else we can leverage.
We fire up ffuf and find a number of directories.
/'___\ /'___\ /'___\
/\ \__/ /\ \__/ __ __ /\ \__/
\ \ ,__\\ \ ,__\/\ \/\ \ \ \ ,__\
\ \ \_/ \ \ \_/\ \ \_\ \ \ \ \_/
\ \_\ \ \_\ \ \____/ \ \_\
\/_/ \/_/ \/___/ \/_/
v1.0.2
________________________________________________
:: Method : GET
:: URL : http://10.10.10.199/FUZZ/
:: Follow redirects : false
:: Calibration : false
:: Timeout : 10
:: Threads : 40
:: Matcher : Response status: 200,204,301,302,307,401,403
________________________________________________
images [Status: 200, Size: 589, Words: 160, Lines: 22]
css [Status: 200, Size: 697, Words: 215, Lines: 23]
includes [Status: 200, Size: 711, Words: 211, Lines: 23]
js [Status: 200, Size: 582, Words: 156, Lines: 22]
vendor [Status: 200, Size: 1522, Words: 635, Lines: 30]
fonts [Status: 200, Size: 1066, Words: 385, Lines: 26]
[Status: 200, Size: 96, Words: 13, Lines: 7]
At this point, I got stuck for longer than I care to admit. I felt like the next step had to be right in front of my face about to bite my noes off and I was right.
Eventually I checked out /includes
We instantly found some lovely files. auth.php
which we is blank if we attempt to read and auth.php.swp
Which is not.
http://10.10.10.199/includes/auth.php.swp
b0VIM 8.1�-�^���jenniferopenkeys.htb/var/www/htdocs/includes/auth.php 3210#"! Utp=ad� � =����sWB@?" �������mgC� � � { a W J @ �������vpnmUS0���J� � � � � � � � � � � ?>} session_start(); session_destroy(); session_unset();{function close_session()} $_SESSION["username"] = $_REQUEST['username']; $_SESSION["user_agent"] = $_SERVER['HTTP_USER_AGENT']; $_SESSION["remote_addr"] = $_SERVER['REMOTE_ADDR']; $_SESSION["last_activity"] = $_SERVER['REQUEST_TIME']; $_SESSION["login_time"] = $_SERVER['REQUEST_TIME']; $_SESSION["logged_in"] = True;{function init_session()} } return False; { else } } return True; $_SESSION['last_activity'] = $time; // Session is active, update last activity time and return True { else } return False; close_session(); { ($time - $_SESSION['last_activity']) > $session_timeout) if (isset($_SESSION['last_activity']) && $time = $_SERVER['REQUEST_TIME']; // Has the session expired? { if(isset($_SESSION["logged_in"])) // Is the user logged in? session_start(); // Start the session $session_timeout = 300; // Session timeout in seconds{function is_active_session()} return $retcode; system($cmd, $retcode); $cmd = escapeshellcmd("../auth_helpers/check_auth " . $username . " " . $password);{function authenticate($username, $password)
As you can see it isn’t very friendly to read but we do find some very useful info. We now have a username, jennifer
. There is also a reverence to another file, ../auth_helpers/check_auth
Point our browser at that page and we receive an elf exactable. Based of /includes/auth.php.swp
it would see to be used to check the authentication for users logging in on the web page.
This is where we find a rabbit hole. We can spend a ton of time reverseing this binary but it isn’t going to gain us much. What we need can be found with a simple strings.
/usr/libexec/ld.so
OpenBSD
libc.so.95.1
_csu_finish
exit
_Jv_RegisterClasses
atexit
auth_userokay
_end
AWAVAUATSH
t-E1
t7E1
ASAWAVAT
A\A^A_A[]
ASAWAVP
A^A_A[]L3
Linker: LLD 8.0.1
.interp
.note.openbsd.ident
.dynsym
.gnu.hash
.hash
.dynstr
.rela.dyn
.rela.plt
.eh_frame_hdr
.eh_frame
...
Right at the top we find a reference to a specific version of libc. If we google along the lines of libc.so.95.1 exploit
we find reference to CVE 2019-19521. An extremely crazy bug for openbsd that allows for authentication bypass. That sounds pretty useful doesn’t it?
https://n3x0.com/2019/12/05/severe-auth-bypass-and-priv-esc-vulnerabilities-disclosed-in-openbsd/
The above is a blog that discusses the vulnerability in more depth. Essentially, there is a flaw in how OpenBSD authentication works. When -schallenge
is supplied for a username it is parsed as a command line option and further authentication is not requested.
Remember how an elf binary is responsible for authentication the website? That is probably vulnerable. We give it a enter -schallenge
and passwd
(or whatever else you want for a password) and then attempt to login…
And we end up at /sshkey.php
! Oh rats. There is no ssh key for user -schallenge
:P
User.txt
Fortunately for us there is more than one way to provide input to the web application. Checking back to /includes/auth.php.swp
we find that there can be a username cookie set.
So we attempt to login again this time modifying our request with burp to include username=jennifer
in the cookie field
We are then greeted with a beautiful sight, Jennifer’s Private ssh key.
We copy that over to a file on are machine. modify permissions so it will be accepted by ssh. chmod 600 jen_key
and then attempt to ssh into the machine. Our key is accepted and we land in Jennifer’s home directory right next to the user flag.
Root
The fun part is that the same vulnerability that allowed us to login will also allow us to privilege escalate to root. We can’t just use su
though it is vulnerable it causes a segfault so no dice.
Worth a shot though right?
This article goes through some more specific examples of the vulnerability. https://www.openwall.com/lists/oss-security/2019/12/04/5 One of which is a privilege escalation. I attempted to pull it of manually following the article but wasn’t sucessful. I was instead able to find a script on github that was based on the code and this one worked
https://github.com/bcoles/local-exploits/blob/master/CVE-2019-19520/openbsd-authroot
It take two steps. First we leverage xlock, a binary that locks the local display until a password is entered, to join the auth user group. From there the exploit creates and Skey which is used for onetime authentication. The way this interacts with su is different. Su can then be run using the skey for authentication and it does not call a segfault.
Change directory to root, snag the flag and we are done with this machine!
Wrap Up
This was a very fun box thanks to polarbearer & GibParadox for creating it. Also thanks to Pop_eax & Szymex73 for nudging me when I was blind.