Target from: CVE Network

Basic, Rootable

CVE-2019-14813 / 0.0.0.0

4: Flags (2:system, env, root)
1: Service
1,400 pts

#headshot

Level 15 / Senior CTFer

L0n3lyW0lf / 70th Place

4: Flags found
1: Service discovered
1,400 pts
178,186 minutes

This is a target with direct implementation of the CVE-2019-14813 for ghostscript 9.26a and is here to assist in developing exploits for this vulnerability.

Description

A flaw was found in ghostscript, versions 9.x before 9.28, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass -dSAFER restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

Environment details

The system is accessible at 10.0.200.13 and runs gs -sDEVICE=ppmraw -dSAFER on port 12345/tcp.

Flags can be found at:

  • /root/ETSCTF
  • /etc/passwd gecos
  • /etc/shadow password hash
  • env variable

References

Activity Stream

Latest activity on the platform

L0n3lyW0lf managed to headshot [CVE-2019-14813], 54 months ago
L0n3lyW0lf Got the ETSCTF flag under the /root folder of CVE-2019-14813 for 500 points, 54 months ago
L0n3lyW0lf Discovered the ETSCTF username flag under an authentication database file of CVE-2019-14813 for 400 points, 54 months ago
L0n3lyW0lf Discovered the ETSCTF flag on gecos details of CVE-2019-14813 for 200 points, 54 months ago
L0n3lyW0lf Gained access to data stored in environmental variables of CVE-2019-14813 for 300 points, 54 months ago
L0n3lyW0lf Connected to the CVE-2019-14813 service, 58 months ago