# HTB-Outbound

Table of Contents
Scope:
10.10.11.77
Creds:
tyler / LhKL1o9Nm3X2

Recon

Nmap

Terminal window
sudo nmap -sC -sV -sT -vvvv -p- -T5 --min-rate=5000 -Pn outbound.htb
PORT STATE SERVICE REASON VERSION
22/tcp open ssh syn-ack OpenSSH 9.6p1 Ubuntu 3ubuntu13.12 (Ubuntu Linux; protocol 2.0)
80/tcp open http syn-ack nginx 1.24.0 (Ubuntu)
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-title: Did not follow redirect to http://mail.outbound.htb/
|_http-server-header: nginx/1.24.0 (Ubuntu)
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

I checked for other subdomains but no hits:

80/TCP - HTTP

Here we can easily log in with the provided creds:

Scrolling around I manage to find the version:

CVE-2025-49113 - Authenticated RCE

Apparently the exploit lies in this piece of code:

Scrolling further down we can find the PoC:

We can’t just get traditional reverse shell right away, instead it’s limited RCE:

Foothold

Shell as www-data

I was able to get a full-on reverse shell using the following method:

Time for some enum:

I downloaded over linpeas.sh to speed up my enum.

mysql is open and running.

roundcube
RCDBPass2025

MySQL

Lateral Movement - Tyler

Eventually I figured to respray the password and got access as tyler using su:

Return to MySQL

From here we can decipher the text:

And now I can use the /var/www/html/roundcube/decrypt.sh script to decipher that one:

Lateral Movement - Jacob

We can now return back to the web service again to log in there:

jacob
gY4Wr3a1evp4

We can use these creds to login to ssh for real this time:

user.txt

Privilege Escalation

CVE-2025-27591 - Below

So we have sudo -l privs for the following:

Luckily for us someone’s already made a PoC for getting root -> https://github.com/BridgerAlderson/CVE-2025-27591-PoC?tab=readme-ov-file

Super duper easy!

root.txt

---=

My avatar

Thanks for reading my blog post! Feel free to check out my other posts or contact me via the social links in the footer.


More Posts

Comments