Start with nmap:
As always on HTB we add this to hosts:
10.10.11.233 analytical.htb
Looking on webpage I see nothing interesting except:
analytical.com
could be another domain for that machine?
And… it is not.
Let’s run ffuf:
nothing interesting. On top of page we see login button
that redirects to data.analytical.htb
let’s add this to the hosts!
10.10.11.233 data.analytical.htb
Untitled-5.avif
Interesting… I’ve already seen metabase somewhere.
Metabase is the easy, open-source way for everyone in your company to ask questions and learn from data.
I think that metasploit had some exploit for metabase but I’m not sure if that’s correct. Let’s check:
Untitled-1-3.avif
yes it has!
in msf:
Now we have remote shell.
and there is nothing in /home/metabase
So let’s run linpeas.
On host:
On target:
After linpeas ran there is nothing interesting in it’s output.
I accidentally noticed
META_USER=metalytics
META_PASS=An4lytics_REDACTED
in the linpeas output.
So lesson for me to check env vars…
Lets try creds on ssh
Since linpeas found nothing lets do our research.
- Nothing interesting in
/opt
- No other users
- No interesting SUID bins
- it’s old ubuntu version but I don’t think it has vulns. But let’s check
Found this:
https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629
Let’s try it.
On host:
On target:
Done!