Arctic

Summary

  • Discovered only three open ports: RPC on 135, another MSRPC on 49154, and port 8500 running Adobe ColdFusion 8.

  • Identified ColdFusion 8 as vulnerable to RCE using Exploit-DB 50057arrow-up-right.

  • Gained a reverse shell via ColdFusion’s vulnerable REST endpoint.

  • Used windows-exploit-suggester to identify privilege escalation paths.

  • Chose MS10-059 for kernel-level privilege escalation.

  • Uploaded the exploit via certutil and popped a SYSTEM shell.


Enumeration

sudo nmap -A -sC -sV -T4 10.10.10.11 -p- -oN full_tcp.nmap

Nmap Output:

PORT      STATE SERVICE VERSION
135/tcp   open  msrpc   Microsoft Windows RPC
8500/tcp  open  fmtp?   (Coldfusion running here)
49154/tcp open  msrpc   Microsoft Windows RPC
  • Visiting http://10.10.10.11:8500 showed Adobe ColdFusion 8 interface.

  • ColdFusion 8 has known unauthenticated RCE exploits, particularly via FCKeditor or misconfigured endpoints.


Initial Foothold

Used Exploit-DB 50057arrow-up-right — Adobe ColdFusion 8 RCE exploit.

  • Exploit works by uploading a .jsp webshell via the vulnerable file upload endpoint exposed in ColdFusion 8.

Steps:

  1. Modified exploit to upload reverse shell.

  2. Started a local HTTP server to host payload:

  3. Payload logic:

    • Upload nc.exe to victim using certutil

    • Execute it using the uploaded .jsp web shell

Example access:

  • Reverse shell landed on port 7777. Initial shell was low-privilege.


Privilege Escalation

Used windows-exploit-suggester to identify escalation paths:

  • Target identified as Windows 2008 R2 64-bit with no installed patches.

  • Chose exploit: MS10-059 – Vulnerability in the Tracing Feature for Services.

Downloaded compiled exploit from: https://github.com/SecWiki/windows-kernel-exploits/blob/master/MS10-059/MS10-059.exearrow-up-right

Uploaded the executable using certutil:

Ran the exploit with a listener on port 9999:

On attacker machine:

  • SYSTEM reverse shell established 🎯

Last updated