A detailed walkthrough of the HackTheBox 'Barrier' Linux machine involving multiple chained vulnerabilities. The attack path starts with exploiting CVE-2024-45409, a SAML signature bypass in GitLab's Ruby SAML library, to forge a SAML assertion and gain admin access to GitLab. From there, an Authentik API token stored in GitLab CI/CD variables is used to create an admin account in Authentik. With Authentik admin access, user impersonation in Apache Guacamole yields an SSH shell as user 'maki'. Database credentials from Guacamole's MariaDB backend expose an SSH private key and passphrase for another user, whose bash history contains a password enabling sudo to root.

24m read timeFrom 0xdf.gitlab.io
Post cover image
Table of contents
Box InfoReconShell as makiShell as maki_admShell as root

Sort: