Pelican
udo gcore to dump root process memory
Summary
Identified Zookeeper Exhibitor dashboard on port
8080
, known to be vulnerable to remote command execution.Used public exploit to gain shell access as
charles
.Privilege escalation achieved via
sudo gcore
โ dumped memory of aroot
process and recovered the root password.
๐งต Let's Unpack
๐ Enumeration
Nmap Full TCP Scan
Nmap Service Enumeration
Two SSH ports:
22
and2222
(both OpenSSH 7.9p1)Samba services on
139
and445
CUPS on
631
with PUT method allowedZookeeper Exhibitor interface discovered on port
8080
Port
8081
redirects to8080/exhibitor/v1/ui/index.html
Port
44505
was open|filtered (tcpwrapped)
๐ช Initial Foothold
Upgraded to a PTY shell:
๐ Privilege Escalation
Checked sudo permissions:
Identified an interesting root-owned process:
Used gcore
to dump memory of the root process:
Switched to root:
โ ๏ธ Gotcha!
Zookeeper Exhibitor UIs exposed without auth and
gcore
sudo misconfigs are a root access recipe waiting to be abused.
Last updated
Was this helpful?