Arctic
Last updated
Was this helpful?
Last updated
Was this helpful?
Initial Foothold : RCE from ColdFusion Application running on port 8500
Privilege Escalation :
Start with port scanning
After Running full port scan we only got three ports open
Port 8500 looks interesting Lets enumerate this port
There were some directory on this ports lets open them
ColdFusion was running in this directory
We can observe that the version is COLDFUSION 8
we can search for possible exploits of this version
Got some exploits
Start with Directory Traversal exploit
According to this exploit the vuln is present in
Now we will try to find the password using this directory traversel vulnerablity
Using the above url payload we got the content of password.properites file
Lets decrpyt the hash using crackstation.net site
Yeah got the password as happyday
Using this password try to login into the admin sectioin of the site
Successfully logged in as administrator
There are two ways for exploiting this CMS
Using task scheduler
Using arbitary file upload vulnerabilty
There was an option in the CMS where we can schedule task
Here we can create our own task and will then execute it to download malicious file and then execute it on the victim machine
But we need to find the file path where we have to save the file
We can get the full file path from mapping section of the settings
Now create task in scheduler
Before that create payload in jsp format using msfvenom
Host this file on our machine
And task is scheduled
Now execute this task and the shell.jsp file will be downloaded and will be saved in /CFIDE/ directory
Launch netcat listener on our host machine
Execute the payload using the path we specified where the exploit is saved
Got the reverse shell
Another way
After some googling i found a exploit for coldfusion 8 which will upload file on the web server
In this exploit we just have to provide the path of the web server
lets use this exploit
This exploit successfully uploaded the payload and also provided us the path from where we can execute our payload
Setup listener and execute the payload
And we got back the shell
SeImpersonatePrivilege was enabled so we can abuse this service token for privilege escation
You can find more information about this at
For abusing this token we will use
This exploit require reverse shell binary
generate reverse shell using msfvenom
Now transfer shell.exe and juicypotato.exe to the windows host machine
We will need CLSID for this exploit we can obtain CLSID from the juicy-potato github repo
We will try with First CLSID
And we got back the reverse shell with elevated privileges
That's all for this machine
Good Bye :)