Target from: CVE Network

Intermediate, Rootable

CVE-2020-7247 / 0.0.0.0

4: Flags (2:system, env, root)
1: Service
3,600 pts

#headshot

Level 15 / Senior CTFer

L0n3lyW0lf / 70th Place

4: Flags found
1: Service discovered
3,600 pts
164,380 minutes

This is a target running a vulnerable OpenSMTPD instance of CVE-2020-7247.

Description

A vulnerability discovered in OpenSMTPD, OpenBSD's mail server was exploitable since May 2018 (commit a8e222352f, "switch smtpd to new grammar") and allows an attacker to execute arbitrary shell commands, as root

Environment details

The system is accessible at 10.0.100.33 and runs OpenSMTPD on Debian Buster on the default port (25/tcp).

Flags can be found at the usual places:

  • /root
  • /etc/passwd gecos
  • /etc/shadow password hash
  • env variable

References

Activity Stream

Latest activity on the platform

L0n3lyW0lf managed to headshot [CVE-2020-7247], 54 months ago
L0n3lyW0lf Gained access to data stored in environmental variables from CVE-2020-7247 for 700 points, 54 months ago
L0n3lyW0lf Discovered the ETSCTF username flag under the /etc/shadow file from CVE-2020-7247 for 1000 points, 57 months ago
L0n3lyW0lf Discovered the ETSCTF username gecos flag under the /etc/passwd file from CVE-2020-7247 for 800 points, 57 months ago
L0n3lyW0lf Got the /root flag from CVE-2020-7247 for 1000 points, 57 months ago
L0n3lyW0lf Connected to the smtp port of CVE-2020-7247 for 100 points, 57 months ago