-
-
Notifications
You must be signed in to change notification settings - Fork 2.9k
HTB TheFrizz #1348
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
HTB TheFrizz #1348
Conversation
- Remove searchindex.js (auto-generated file)
🔗 Additional ContextOriginal Blog Post: https://0xdf.gitlab.io/2025/08/23/htb-thefrizz.html Content Categories: Based on the analysis, this content was categorized under "Generic Hacking -> Web: Arbitrary File Write to RCE (add a subsection with CVE-2023-45878 Gibbon LMS PoC and parameter format). Cross-link notes to Pentesting Network -> Kerberos/SMB (Kerberos-only environments: time sync, krb5.conf, GSSAPI SSH/SPN).". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
merge |
5f8610b
to
948d841
Compare
948d841
to
40ff109
Compare
263d2a3
to
36cf553
Compare
e6449f9
to
710e03a
Compare
710e03a
to
4966f6d
Compare
4b54ccf
to
74cc86a
Compare
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Technical Summary: Gibbon LMS Arbitrary File Write to Pre-Auth RCE (CVE-2023-45878)
Target and Recon
Windows Domain Controller exposing:
OpenSSH_for_Windows_8.1
53
88/464
389/3268
445
(NTLM disabled)9389
httpd 2.4.58
(OpenSSL 3....
- Web: Arbitrary file write to RCE – Gibbon LMS (CVE-2023-45878)
- File updated: src/pentesting-web/file-upload/README.md
- What: A new subsection “Gibbon LMS arbitrary file write to pre-auth RCE (CVE-2023-45878)” documenting:
- Vulnerable endpoint: /Gibbon-LMS/modules/Rubrics/rubrics_visualise_saveAjax.php
- Parameters and format: img must be “[mime];[name],[base64]”, with path= and a dummy gibbonPersonID.
- Clear curl PoCs to write a file and drop a minimal php webshell, with whoami example and notes on how the handler base64-decodes and writes bytes wit...
- searchindex.js removed: This auto-generated file has been removed to prevent conflicts
🔧 Technical Details
Pre-auth arbitrary file write to RCE in Gibbon (CVE-2023-45878): Target
modules/Rubrics/rubrics_visualise_saveAjax.php
and POSTimg
as[mime];[name],[base64]
with anygibbonPersonID
andpath
to a.php
under the app root. The server base64-decodes and writes bytes without validation, enabling a webshell. Exampleimg
:image/png;foo,PD9waHAgc3lzdGVtKCRfR0VUWydjbWQnXSk7Pz4=
andpat...
🤖 Agent Actions
I’ve updated HackTricks with the key technical material from the blog and cross-linked the Kerberos-only environment notes into the most relevant network pentesting pages. Below are the changes implemented.
What I added
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup
The searchindex.js file is automatically generated and should not be included in manual commits.