πŸ–¨οΈInterpreter

https://app.hackthebox.com/machines/Interpreter

HTB β€” Interpreter Walkthrough


Recon

Nmap

Findings:

  • 22/tcp β€” SSH

  • 80/tcp β€” HTTP (Jetty)

  • 443/tcp β€” HTTPS (Jetty)

Both web ports show Mirth Connect Administrator.


Web Enumeration

Browsing the target:

Landing page β†’ Mirth Connect Administrator

Important observation:

  • Redirect logic references /webadmin/Index.action

  • Presence of Java Web Start (webstart.jnlp)


Version Identification

Result:

Version < 4.4.1 β†’ Vulnerable.


Initial Access β€” CVE-2023-43208

Exploit used:

Listener:

Shell obtained:


Local Enumeration

Inspect configuration:

Credentials recovered:


Database Access

Interesting tables:

  • CHANNEL

  • PERSON

  • PERSON_PASSWORD

Dump passwords:

(No useful cracking results.)


Discovering Internal Service (addPatient)

Active listeners:

Interesting port:

Dump channel configuration:

Inside channel XML:

βœ… Internal API endpoint discovered

This is common in Mirth β€” channels often forward messages to backend services.


Interacting With addPatient

Test request from compromised shell:

Valid response β†’ Endpoint confirmed.


Vulnerability Analysis

Observed behavior:

  • User input reflected in response

  • Python-style expression evaluation

Test payload:

Response:

βœ… Code Execution via Template Injection

Backend is evaluating expressions inside {}.


Reading Flags

User Flag


Root Flag


Key Takeaways

βœ” RCE in Mirth Connect (CVE-2023-43208) βœ” Sensitive credentials in config files βœ” Channel configs often reveal internal architecture βœ” Template Injection β†’ Full system compromise


Last updated