CVE-2019-14287
Difficulty: Easy
2024-08-01 by Rashad Aliyev
Escalate Privilege Using CVE-2019-14287 Vulnerability.
Start a virtual machine (VM) in VirtualBox, launch the VirtualBox application and select the desired VM from the list on the left. Click the Start button to power on the VM. As the VM boots up, the assigned IP address will be displayed on the server screen within the VM. This IP address is essential for network connectivity and can be used to access the VM remotely or to configure network-related settings.
SSH to server port 22
user: cve2019
password is: cve2019
Escalate Privilege Using CVE-2019-14287 Vulnerability.
Find the flag from the file located at /root/flag.txt
Command:
cat /root/flag.txt
Configuration
Open VirtualBox and in the VirtualBox Manager, navigate to the
File menu at the top left corner and select
Import Appliance.... In the Appliance to Import window, click the folder icon to choose a virtual appliance file to import. Browse to the location of your .ova file, select it, and click
Open.
Review the Appliance Settings window that appears. Here, you can review and change the settings if necessary, such as the name of the virtual machine, CPU count, and memory allocation. Once you are satisfied with the settings, click
Next and then
Import to begin the import process. VirtualBox will start importing the .ova file, and this process may take a few minutes depending on the size of the .ova file and your system's performance. Once the import is complete, your virtual machine will be ready to use.
Network
DHCP: Enabled
IP Address Assignment: Automatically assigned (visible upon server startup)